bash |
CVE-2019-18276 |
LOW |
5.0-6ubuntu1.1 |
5.0-6ubuntu1.2 |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html https://access.redhat.com/security/cve/CVE-2019-18276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276 https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff https://linux.oracle.com/cve/CVE-2019-18276.html https://linux.oracle.com/errata/ELSA-2021-1679.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-18276 https://security.gentoo.org/glsa/202105-34 https://security.netapp.com/advisory/ntap-20200430-0003/ https://ubuntu.com/security/notices/USN-5380-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.youtube.com/watch?v=-wGtxJ8opa8
|
binutils |
CVE-2017-13716 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-13716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009
|
binutils |
CVE-2018-20657 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
binutils |
CVE-2019-1010204 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 https://linux.oracle.com/cve/CVE-2019-1010204.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://security.netapp.com/advisory/ntap-20190822-0001/ https://sourceware.org/bugzilla/show_bug.cgi?id=23765 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-5349-1
|
binutils |
CVE-2021-45078 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.netapp.com/advisory/ntap-20220107-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=28694 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02 https://ubuntu.com/security/notices/USN-5341-1
|
binutils-common |
CVE-2017-13716 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-13716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009
|
binutils-common |
CVE-2018-20657 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
binutils-common |
CVE-2019-1010204 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 https://linux.oracle.com/cve/CVE-2019-1010204.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://security.netapp.com/advisory/ntap-20190822-0001/ https://sourceware.org/bugzilla/show_bug.cgi?id=23765 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-5349-1
|
binutils-common |
CVE-2021-45078 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.netapp.com/advisory/ntap-20220107-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=28694 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02 https://ubuntu.com/security/notices/USN-5341-1
|
binutils-x86-64-linux-gnu |
CVE-2017-13716 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-13716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009
|
binutils-x86-64-linux-gnu |
CVE-2018-20657 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
binutils-x86-64-linux-gnu |
CVE-2019-1010204 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 https://linux.oracle.com/cve/CVE-2019-1010204.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://security.netapp.com/advisory/ntap-20190822-0001/ https://sourceware.org/bugzilla/show_bug.cgi?id=23765 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-5349-1
|
binutils-x86-64-linux-gnu |
CVE-2021-45078 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.netapp.com/advisory/ntap-20220107-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=28694 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02 https://ubuntu.com/security/notices/USN-5341-1
|
coreutils |
CVE-2016-2781 |
LOW |
8.30-3ubuntu2 |
|
Expand...http://seclists.org/oss-sec/2016/q1/452 http://www.openwall.com/lists/oss-security/2016/02/28/2 http://www.openwall.com/lists/oss-security/2016/02/28/3 https://access.redhat.com/security/cve/CVE-2016-2781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lore.kernel.org/patchwork/patch/793178/ https://nvd.nist.gov/vuln/detail/CVE-2016-2781
|
cpp |
CVE-2020-13844 |
MEDIUM |
1.185.1ubuntu2 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
cpp-9 |
CVE-2020-13844 |
MEDIUM |
9.4.0-1ubuntu1~20.04.1 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
curl |
CVE-2022-27782 |
MEDIUM |
7.68.0-1ubuntu2.10 |
7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782 https://curl.se/docs/CVE-2022-27782.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782 https://hackerone.com/reports/1555796 https://nvd.nist.gov/vuln/detail/CVE-2022-27782 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
curl |
CVE-2022-27781 |
LOW |
7.68.0-1ubuntu2.10 |
7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781 https://curl.se/docs/CVE-2022-27781.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781 https://github.com/curl/curl/commit/f6c335d63f https://hackerone.com/reports/1555441 https://nvd.nist.gov/vuln/detail/CVE-2022-27781 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
dbus |
CVE-2020-35512 |
LOW |
1.12.16-2ubuntu2.1 |
1.12.16-2ubuntu2.2 |
Expand...https://access.redhat.com/security/cve/CVE-2020-35512 https://bugs.gentoo.org/755392 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512 https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18) https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32) https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20) https://gitlab.freedesktop.org/dbus/dbus/-/issues/305 https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128 https://security-tracker.debian.org/tracker/CVE-2020-35512 https://ubuntu.com/security/notices/USN-5244-1 https://ubuntu.com/security/notices/USN-5244-2
|
dbus-user-session |
CVE-2020-35512 |
LOW |
1.12.16-2ubuntu2.1 |
1.12.16-2ubuntu2.2 |
Expand...https://access.redhat.com/security/cve/CVE-2020-35512 https://bugs.gentoo.org/755392 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512 https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18) https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32) https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20) https://gitlab.freedesktop.org/dbus/dbus/-/issues/305 https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128 https://security-tracker.debian.org/tracker/CVE-2020-35512 https://ubuntu.com/security/notices/USN-5244-1 https://ubuntu.com/security/notices/USN-5244-2
|
dpkg |
CVE-2022-1664 |
MEDIUM |
1.19.7ubuntu3 |
1.19.7ubuntu3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664 https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495 https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5 https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html https://lists.debian.org/debian-security-announce/2022/msg00115.html https://nvd.nist.gov/vuln/detail/CVE-2022-1664 https://ubuntu.com/security/notices/USN-5446-1 https://ubuntu.com/security/notices/USN-5446-2
|
dpkg-dev |
CVE-2022-1664 |
MEDIUM |
1.19.7ubuntu3 |
1.19.7ubuntu3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664 https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495 https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5 https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html https://lists.debian.org/debian-security-announce/2022/msg00115.html https://nvd.nist.gov/vuln/detail/CVE-2022-1664 https://ubuntu.com/security/notices/USN-5446-1 https://ubuntu.com/security/notices/USN-5446-2
|
e2fsprogs |
CVE-2022-1304 |
MEDIUM |
1.45.5-2ubuntu1 |
1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304 https://bugzilla.redhat.com/show_bug.cgi?id=2069726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304 https://marc.info/?l=linux-ext4&m=165056234501732&w=2 https://nvd.nist.gov/vuln/detail/CVE-2022-1304 https://ubuntu.com/security/notices/USN-5464-1
|
g++ |
CVE-2020-13844 |
MEDIUM |
1.185.1ubuntu2 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
g++-9 |
CVE-2020-13844 |
MEDIUM |
9.4.0-1ubuntu1~20.04.1 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
gcc |
CVE-2020-13844 |
MEDIUM |
1.185.1ubuntu2 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
gcc-9 |
CVE-2020-13844 |
MEDIUM |
9.4.0-1ubuntu1~20.04.1 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
gcc-9-base |
CVE-2020-13844 |
MEDIUM |
9.4.0-1ubuntu1~20.04.1 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
git |
CVE-2018-1000021 |
LOW |
1:2.25.1-1ubuntu3.4 |
|
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
|
git-man |
CVE-2018-1000021 |
LOW |
1:2.25.1-1ubuntu3.4 |
|
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
|
gzip |
CVE-2022-1271 |
MEDIUM |
1.10-0ubuntu4 |
1.10-0ubuntu4.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1271 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271 https://errata.almalinux.org/8/ALSA-2022-1537.html https://linux.oracle.com/cve/CVE-2022-1271.html https://linux.oracle.com/errata/ELSA-2022-5052.html https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html https://ubuntu.com/security/notices/USN-5378-1 https://ubuntu.com/security/notices/USN-5378-2 https://ubuntu.com/security/notices/USN-5378-3 https://ubuntu.com/security/notices/USN-5378-4 https://www.openwall.com/lists/oss-security/2022/04/07/8
|
krb5-locales |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
krb5-locales |
CVE-2021-37750 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json https://access.redhat.com/security/cve/CVE-2021-37750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://nvd.nist.gov/vuln/detail/CVE-2021-37750 https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libapparmor1 |
CVE-2016-1585 |
MEDIUM |
2.13.3-7ubuntu5.1 |
|
Expand...https://bugs.launchpad.net/apparmor/+bug/1597017 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2016-1585
|
libasan5 |
CVE-2020-13844 |
MEDIUM |
9.4.0-1ubuntu1~20.04.1 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
libasn1-8-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libass-dev |
CVE-2020-24994 |
MEDIUM |
1:0.14.0-2 |
|
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4892 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24994 https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e https://github.com/libass/libass/issues/422 https://github.com/libass/libass/issues/422#issuecomment-806002919 https://github.com/libass/libass/issues/423
|
libass-dev |
CVE-2020-26682 |
MEDIUM |
1:0.14.0-2 |
|
Expand...http://www.openwall.com/lists/oss-security/2020/11/19/7 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26682 https://github.com/libass/libass/issues/431 https://github.com/libass/libass/pull/432 https://security.gentoo.org/glsa/202012-12
|
libass9 |
CVE-2020-24994 |
MEDIUM |
1:0.14.0-2 |
|
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4892 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24994 https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e https://github.com/libass/libass/issues/422 https://github.com/libass/libass/issues/422#issuecomment-806002919 https://github.com/libass/libass/issues/423
|
libass9 |
CVE-2020-26682 |
MEDIUM |
1:0.14.0-2 |
|
Expand...http://www.openwall.com/lists/oss-security/2020/11/19/7 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26682 https://github.com/libass/libass/issues/431 https://github.com/libass/libass/pull/432 https://security.gentoo.org/glsa/202012-12
|
libbinutils |
CVE-2017-13716 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-13716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009
|
libbinutils |
CVE-2018-20657 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
libbinutils |
CVE-2019-1010204 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 https://linux.oracle.com/cve/CVE-2019-1010204.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://security.netapp.com/advisory/ntap-20190822-0001/ https://sourceware.org/bugzilla/show_bug.cgi?id=23765 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-5349-1
|
libbinutils |
CVE-2021-45078 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.netapp.com/advisory/ntap-20220107-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=28694 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02 https://ubuntu.com/security/notices/USN-5341-1
|
libc-bin |
CVE-2016-20013 |
LOW |
2.31-0ubuntu9.7 |
|
Expand...https://akkadia.org/drepper/SHA-crypt.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013 https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/ https://twitter.com/solardiz/status/795601240151457793
|
libc-dev-bin |
CVE-2016-20013 |
LOW |
2.31-0ubuntu9.7 |
|
Expand...https://akkadia.org/drepper/SHA-crypt.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013 https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/ https://twitter.com/solardiz/status/795601240151457793
|
libc6 |
CVE-2016-20013 |
LOW |
2.31-0ubuntu9.7 |
|
Expand...https://akkadia.org/drepper/SHA-crypt.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013 https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/ https://twitter.com/solardiz/status/795601240151457793
|
libc6-dev |
CVE-2016-20013 |
LOW |
2.31-0ubuntu9.7 |
|
Expand...https://akkadia.org/drepper/SHA-crypt.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013 https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/ https://twitter.com/solardiz/status/795601240151457793
|
libcairo2 |
CVE-2017-7475 |
LOW |
1.16.0-4ubuntu1 |
|
Expand...http://seclists.org/oss-sec/2017/q2/151 https://access.redhat.com/security/cve/CVE-2017-7475 https://bugs.freedesktop.org/show_bug.cgi?id=100763 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475 https://github.com/advisories/GHSA-5v3f-73gv-x7x5 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2017-7475
|
libcairo2 |
CVE-2018-18064 |
LOW |
1.16.0-4ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-18064 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064 https://gitlab.freedesktop.org/cairo/cairo/issues/341 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libcairo2 |
CVE-2019-6461 |
LOW |
1.16.0-4ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-6461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461 https://github.com/TeamSeri0us/pocs/tree/master/gerbv https://gitlab.freedesktop.org/cairo/cairo/issues/352 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-6461
|
libcom-err2 |
CVE-2022-1304 |
MEDIUM |
1.45.5-2ubuntu1 |
1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304 https://bugzilla.redhat.com/show_bug.cgi?id=2069726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304 https://marc.info/?l=linux-ext4&m=165056234501732&w=2 https://nvd.nist.gov/vuln/detail/CVE-2022-1304 https://ubuntu.com/security/notices/USN-5464-1
|
libctf-nobfd0 |
CVE-2017-13716 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-13716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009
|
libctf-nobfd0 |
CVE-2018-20657 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
libctf-nobfd0 |
CVE-2019-1010204 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 https://linux.oracle.com/cve/CVE-2019-1010204.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://security.netapp.com/advisory/ntap-20190822-0001/ https://sourceware.org/bugzilla/show_bug.cgi?id=23765 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-5349-1
|
libctf-nobfd0 |
CVE-2021-45078 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.netapp.com/advisory/ntap-20220107-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=28694 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02 https://ubuntu.com/security/notices/USN-5341-1
|
libctf0 |
CVE-2017-13716 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2017-13716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009
|
libctf0 |
CVE-2018-20657 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
libctf0 |
CVE-2019-1010204 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 https://linux.oracle.com/cve/CVE-2019-1010204.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://security.netapp.com/advisory/ntap-20190822-0001/ https://sourceware.org/bugzilla/show_bug.cgi?id=23765 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-5349-1
|
libctf0 |
CVE-2021-45078 |
LOW |
2.34-6ubuntu1.3 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.netapp.com/advisory/ntap-20220107-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=28694 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02 https://ubuntu.com/security/notices/USN-5341-1
|
libcurl3-gnutls |
CVE-2022-27782 |
MEDIUM |
7.68.0-1ubuntu2.10 |
7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782 https://curl.se/docs/CVE-2022-27782.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782 https://hackerone.com/reports/1555796 https://nvd.nist.gov/vuln/detail/CVE-2022-27782 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
libcurl3-gnutls |
CVE-2022-27781 |
LOW |
7.68.0-1ubuntu2.10 |
7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781 https://curl.se/docs/CVE-2022-27781.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781 https://github.com/curl/curl/commit/f6c335d63f https://hackerone.com/reports/1555441 https://nvd.nist.gov/vuln/detail/CVE-2022-27781 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
libcurl4 |
CVE-2022-27782 |
MEDIUM |
7.68.0-1ubuntu2.10 |
7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782 https://curl.se/docs/CVE-2022-27782.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782 https://hackerone.com/reports/1555796 https://nvd.nist.gov/vuln/detail/CVE-2022-27782 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
libcurl4 |
CVE-2022-27781 |
LOW |
7.68.0-1ubuntu2.10 |
7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781 https://curl.se/docs/CVE-2022-27781.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781 https://github.com/curl/curl/commit/f6c335d63f https://hackerone.com/reports/1555441 https://nvd.nist.gov/vuln/detail/CVE-2022-27781 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
libdbus-1-3 |
CVE-2020-35512 |
LOW |
1.12.16-2ubuntu2.1 |
1.12.16-2ubuntu2.2 |
Expand...https://access.redhat.com/security/cve/CVE-2020-35512 https://bugs.gentoo.org/755392 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512 https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18) https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32) https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20) https://gitlab.freedesktop.org/dbus/dbus/-/issues/305 https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128 https://security-tracker.debian.org/tracker/CVE-2020-35512 https://ubuntu.com/security/notices/USN-5244-1 https://ubuntu.com/security/notices/USN-5244-2
|
libdpkg-perl |
CVE-2022-1664 |
MEDIUM |
1.19.7ubuntu3 |
1.19.7ubuntu3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664 https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495 https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5 https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html https://lists.debian.org/debian-security-announce/2022/msg00115.html https://nvd.nist.gov/vuln/detail/CVE-2022-1664 https://ubuntu.com/security/notices/USN-5446-1 https://ubuntu.com/security/notices/USN-5446-2
|
libext2fs2 |
CVE-2022-1304 |
MEDIUM |
1.45.5-2ubuntu1 |
1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304 https://bugzilla.redhat.com/show_bug.cgi?id=2069726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304 https://marc.info/?l=linux-ext4&m=165056234501732&w=2 https://nvd.nist.gov/vuln/detail/CVE-2022-1304 https://ubuntu.com/security/notices/USN-5464-1
|
libflac8 |
CVE-2020-0499 |
LOW |
1.3.3-1build1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-0499 https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/ https://source.android.com/security/bulletin/pixel/2020-12-01
|
libfreetype-dev |
CVE-2022-27404 |
MEDIUM |
2.10.1-2ubuntu0.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-27404 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404 https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27404
|
libfreetype-dev |
CVE-2022-27405 |
LOW |
2.10.1-2ubuntu0.1 |
|
Expand...http://freetype.com https://access.redhat.com/security/cve/CVE-2022-27405 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405 https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27405
|
libfreetype-dev |
CVE-2022-27406 |
LOW |
2.10.1-2ubuntu0.1 |
|
Expand...http://freetype.com https://access.redhat.com/security/cve/CVE-2022-27406 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406 https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2 https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27406 https://ubuntu.com/security/notices/USN-5453-1
|
libfreetype6 |
CVE-2022-27404 |
MEDIUM |
2.10.1-2ubuntu0.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-27404 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404 https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27404
|
libfreetype6 |
CVE-2022-27405 |
LOW |
2.10.1-2ubuntu0.1 |
|
Expand...http://freetype.com https://access.redhat.com/security/cve/CVE-2022-27405 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405 https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27405
|
libfreetype6 |
CVE-2022-27406 |
LOW |
2.10.1-2ubuntu0.1 |
|
Expand...http://freetype.com https://access.redhat.com/security/cve/CVE-2022-27406 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406 https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2 https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27406 https://ubuntu.com/security/notices/USN-5453-1
|
libfreetype6-dev |
CVE-2022-27404 |
MEDIUM |
2.10.1-2ubuntu0.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-27404 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404 https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27404
|
libfreetype6-dev |
CVE-2022-27405 |
LOW |
2.10.1-2ubuntu0.1 |
|
Expand...http://freetype.com https://access.redhat.com/security/cve/CVE-2022-27405 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405 https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27405
|
libfreetype6-dev |
CVE-2022-27406 |
LOW |
2.10.1-2ubuntu0.1 |
|
Expand...http://freetype.com https://access.redhat.com/security/cve/CVE-2022-27406 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406 https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2 https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27406 https://ubuntu.com/security/notices/USN-5453-1
|
libgcc-9-dev |
CVE-2020-13844 |
MEDIUM |
9.4.0-1ubuntu1~20.04.1 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
libgif7 |
CVE-2020-23922 |
LOW |
5.1.9-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-23922 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23922 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://sourceforge.net/p/giflib/bugs/151/
|
libgif7 |
CVE-2021-40633 |
LOW |
5.1.9-1 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40633 https://sourceforge.net/p/giflib/bugs/157/
|
libgif7 |
CVE-2022-28506 |
LOW |
5.1.9-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-28506 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28506 https://github.com/verf1sh/Poc/blob/master/asan_report_giflib.png https://github.com/verf1sh/Poc/blob/master/giflib_poc https://nvd.nist.gov/vuln/detail/CVE-2022-28506 https://sourceforge.net/p/giflib/bugs/159/
|
libgmp10 |
CVE-2021-43618 |
LOW |
2:6.2.0+dfsg-4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-43618 https://bugs.debian.org/994405 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618 https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html https://nvd.nist.gov/vuln/detail/CVE-2021-43618
|
libgssapi-krb5-2 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libgssapi-krb5-2 |
CVE-2021-37750 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json https://access.redhat.com/security/cve/CVE-2021-37750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://nvd.nist.gov/vuln/detail/CVE-2021-37750 https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libgssapi3-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libhcrypto4-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libheimbase1-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libheimntlm0-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libhx509-5-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libjbig0 |
CVE-2017-9937 |
LOW |
2.1-3.1build1 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707 http://www.securityfocus.com/bid/99304 https://access.redhat.com/security/cve/CVE-2017-9937 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libjpeg-turbo8 |
CVE-2021-46822 |
MEDIUM |
2.0.3-0ubuntu1.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-46822 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46822 https://exchange.xforce.ibmcloud.com/vulnerabilities/221567 https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2
|
libjpeg-turbo8 |
CVE-2020-17541 |
LOW |
2.0.3-0ubuntu1.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-17541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541 https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392 https://linux.oracle.com/cve/CVE-2020-17541.html https://linux.oracle.com/errata/ELSA-2021-4288.html https://nvd.nist.gov/vuln/detail/CVE-2020-17541
|
libjpeg-turbo8-dev |
CVE-2021-46822 |
MEDIUM |
2.0.3-0ubuntu1.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-46822 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46822 https://exchange.xforce.ibmcloud.com/vulnerabilities/221567 https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2
|
libjpeg-turbo8-dev |
CVE-2020-17541 |
LOW |
2.0.3-0ubuntu1.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-17541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541 https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392 https://linux.oracle.com/cve/CVE-2020-17541.html https://linux.oracle.com/errata/ELSA-2021-4288.html https://nvd.nist.gov/vuln/detail/CVE-2020-17541
|
libk5crypto3 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libk5crypto3 |
CVE-2021-37750 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json https://access.redhat.com/security/cve/CVE-2021-37750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://nvd.nist.gov/vuln/detail/CVE-2021-37750 https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libkrb5-26-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libkrb5-3 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libkrb5-3 |
CVE-2021-37750 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json https://access.redhat.com/security/cve/CVE-2021-37750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://nvd.nist.gov/vuln/detail/CVE-2021-37750 https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libkrb5support0 |
CVE-2021-36222 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
libkrb5support0 |
CVE-2021-37750 |
MEDIUM |
1.17-6ubuntu4.1 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json https://access.redhat.com/security/cve/CVE-2021-37750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://nvd.nist.gov/vuln/detail/CVE-2021-37750 https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
libldap-2.4-2 |
CVE-2022-29155 |
MEDIUM |
2.4.49+dfsg-2ubuntu1.8 |
2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155 https://bugs.openldap.org/show_bug.cgi?id=9815 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155 https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html https://nvd.nist.gov/vuln/detail/CVE-2022-29155 https://security.netapp.com/advisory/ntap-20220609-0007/ https://ubuntu.com/security/notices/USN-5424-1 https://ubuntu.com/security/notices/USN-5424-2 https://www.debian.org/security/2022/dsa-5140
|
libldap-common |
CVE-2022-29155 |
MEDIUM |
2.4.49+dfsg-2ubuntu1.8 |
2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155 https://bugs.openldap.org/show_bug.cgi?id=9815 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155 https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html https://nvd.nist.gov/vuln/detail/CVE-2022-29155 https://security.netapp.com/advisory/ntap-20220609-0007/ https://ubuntu.com/security/notices/USN-5424-1 https://ubuntu.com/security/notices/USN-5424-2 https://www.debian.org/security/2022/dsa-5140
|
liblept5 |
CVE-2020-36278 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36278 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36278 https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
liblept5 |
CVE-2020-36279 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36279 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22512 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36279 https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
liblept5 |
CVE-2020-36280 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36280 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36280 https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
liblept5 |
CVE-2020-36281 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36281 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22140 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36281 https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
libleptonica-dev |
CVE-2020-36278 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36278 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36278 https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
libleptonica-dev |
CVE-2020-36279 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36279 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22512 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36279 https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
libleptonica-dev |
CVE-2020-36280 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36280 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36280 https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
libleptonica-dev |
CVE-2020-36281 |
MEDIUM |
1.79.0-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36281 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22140 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36281 https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/ https://security.gentoo.org/glsa/202107-53
|
libncurses6 |
CVE-2021-39537 |
LOW |
6.2-0ubuntu2 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://access.redhat.com/security/cve/CVE-2021-39537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://ubuntu.com/security/notices/USN-5477-1
|
libncurses6 |
CVE-2022-29458 |
LOW |
6.2-0ubuntu2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-29458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458 https://invisible-island.net/ncurses/NEWS.html#t20220416 https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://ubuntu.com/security/notices/USN-5477-1
|
libncursesw6 |
CVE-2021-39537 |
LOW |
6.2-0ubuntu2 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://access.redhat.com/security/cve/CVE-2021-39537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://ubuntu.com/security/notices/USN-5477-1
|
libncursesw6 |
CVE-2022-29458 |
LOW |
6.2-0ubuntu2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-29458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458 https://invisible-island.net/ncurses/NEWS.html#t20220416 https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://ubuntu.com/security/notices/USN-5477-1
|
libopenjp2-7 |
CVE-2019-6988 |
LOW |
2.3.1-1ubuntu4.20.04.1 |
|
Expand...http://www.securityfocus.com/bid/106785 https://access.redhat.com/security/cve/CVE-2019-6988 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988 https://github.com/uclouvain/openjpeg/issues/1178
|
libopenjp2-7 |
CVE-2021-29338 |
LOW |
2.3.1-1ubuntu4.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-29338 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338 https://github.com/uclouvain/openjpeg/issues/1338 https://github.com/uclouvain/openjpeg/pull/1346 https://github.com/uclouvain/openjpeg/pull/1395 https://github.com/uclouvain/openjpeg/pull/1396 https://github.com/uclouvain/openjpeg/pull/1397 https://github.com/uclouvain/openjpeg/pull/1398 https://linux.oracle.com/cve/CVE-2021-29338.html https://linux.oracle.com/errata/ELSA-2021-4251.html https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
|
libopenjp2-7 |
CVE-2021-3575 |
LOW |
2.3.1-1ubuntu4.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3575 https://bugzilla.redhat.com/show_bug.cgi?id=1957616 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575 https://github.com/uclouvain/openjpeg/issues/1347 https://linux.oracle.com/cve/CVE-2021-3575.html https://linux.oracle.com/errata/ELSA-2021-4251.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/ https://ubuntu.com/security/CVE-2021-3575
|
libpcre16-3 |
CVE-2017-11164 |
LOW |
2:8.39-12build1 |
|
Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcre16-3 |
CVE-2019-20838 |
LOW |
2:8.39-12build1 |
2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://access.redhat.com/security/cve/CVE-2019-20838 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-20838 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.pcre.org/original/changelog.txt
|
libpcre16-3 |
CVE-2020-14155 |
LOW |
2:8.39-12build1 |
2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://access.redhat.com/security/cve/CVE-2020-14155 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-14155 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.pcre.org/original/changelog.txt
|
libpcre2-16-0 |
CVE-2022-1586 |
LOW |
10.34-7 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1586 https://bugzilla.redhat.com/show_bug.cgi?id=2077976, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586 https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a, https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/ https://nvd.nist.gov/vuln/detail/CVE-2022-1586
|
libpcre2-16-0 |
CVE-2022-1587 |
LOW |
10.34-7 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1587 https://bugzilla.redhat.com/show_bug.cgi?id=2077983, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587 https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/ https://nvd.nist.gov/vuln/detail/CVE-2022-1587
|
libpcre2-32-0 |
CVE-2022-1586 |
LOW |
10.34-7 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1586 https://bugzilla.redhat.com/show_bug.cgi?id=2077976, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586 https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a, https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/ https://nvd.nist.gov/vuln/detail/CVE-2022-1586
|
libpcre2-32-0 |
CVE-2022-1587 |
LOW |
10.34-7 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1587 https://bugzilla.redhat.com/show_bug.cgi?id=2077983, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587 https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/ https://nvd.nist.gov/vuln/detail/CVE-2022-1587
|
libpcre2-8-0 |
CVE-2022-1586 |
LOW |
10.34-7 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1586 https://bugzilla.redhat.com/show_bug.cgi?id=2077976, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586 https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a, https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/ https://nvd.nist.gov/vuln/detail/CVE-2022-1586
|
libpcre2-8-0 |
CVE-2022-1587 |
LOW |
10.34-7 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1587 https://bugzilla.redhat.com/show_bug.cgi?id=2077983, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587 https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/ https://nvd.nist.gov/vuln/detail/CVE-2022-1587
|
libpcre2-dev |
CVE-2022-1586 |
LOW |
10.34-7 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1586 https://bugzilla.redhat.com/show_bug.cgi?id=2077976, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586 https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a, https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/ https://nvd.nist.gov/vuln/detail/CVE-2022-1586
|
libpcre2-dev |
CVE-2022-1587 |
LOW |
10.34-7 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1587 https://bugzilla.redhat.com/show_bug.cgi?id=2077983, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587 https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/ https://nvd.nist.gov/vuln/detail/CVE-2022-1587
|
libpcre2-posix2 |
CVE-2022-1586 |
LOW |
10.34-7 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1586 https://bugzilla.redhat.com/show_bug.cgi?id=2077976, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586 https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a, https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/ https://nvd.nist.gov/vuln/detail/CVE-2022-1586
|
libpcre2-posix2 |
CVE-2022-1587 |
LOW |
10.34-7 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1587 https://bugzilla.redhat.com/show_bug.cgi?id=2077983, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587 https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/ https://nvd.nist.gov/vuln/detail/CVE-2022-1587
|
libpcre3 |
CVE-2017-11164 |
LOW |
2:8.39-12build1 |
|
Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcre3 |
CVE-2019-20838 |
LOW |
2:8.39-12build1 |
2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://access.redhat.com/security/cve/CVE-2019-20838 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-20838 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.pcre.org/original/changelog.txt
|
libpcre3 |
CVE-2020-14155 |
LOW |
2:8.39-12build1 |
2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://access.redhat.com/security/cve/CVE-2020-14155 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-14155 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.pcre.org/original/changelog.txt
|
libpcre3-dev |
CVE-2017-11164 |
LOW |
2:8.39-12build1 |
|
Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcre3-dev |
CVE-2019-20838 |
LOW |
2:8.39-12build1 |
2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://access.redhat.com/security/cve/CVE-2019-20838 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-20838 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.pcre.org/original/changelog.txt
|
libpcre3-dev |
CVE-2020-14155 |
LOW |
2:8.39-12build1 |
2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://access.redhat.com/security/cve/CVE-2020-14155 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-14155 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.pcre.org/original/changelog.txt
|
libpcre32-3 |
CVE-2017-11164 |
LOW |
2:8.39-12build1 |
|
Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcre32-3 |
CVE-2019-20838 |
LOW |
2:8.39-12build1 |
2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://access.redhat.com/security/cve/CVE-2019-20838 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-20838 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.pcre.org/original/changelog.txt
|
libpcre32-3 |
CVE-2020-14155 |
LOW |
2:8.39-12build1 |
2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://access.redhat.com/security/cve/CVE-2020-14155 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-14155 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.pcre.org/original/changelog.txt
|
libpcrecpp0v5 |
CVE-2017-11164 |
LOW |
2:8.39-12build1 |
|
Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libpcrecpp0v5 |
CVE-2019-20838 |
LOW |
2:8.39-12build1 |
2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://access.redhat.com/security/cve/CVE-2019-20838 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2019-20838.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-20838 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.pcre.org/original/changelog.txt
|
libpcrecpp0v5 |
CVE-2020-14155 |
LOW |
2:8.39-12build1 |
2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://access.redhat.com/security/cve/CVE-2020-14155 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-14155 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.pcre.org/original/changelog.txt
|
libperl5.30 |
CVE-2020-16156 |
MEDIUM |
5.30.0-9ubuntu0.2 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://access.redhat.com/security/cve/CVE-2020-16156 https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
libpolkit-agent-1-0 |
CVE-2016-2568 |
LOW |
0.105-26ubuntu1.3 |
|
Expand...http://seclists.org/oss-sec/2016/q1/443 http://www.openwall.com/lists/oss-security/2016/02/26/3 https://access.redhat.com/security/cve/CVE-2016-2568 https://access.redhat.com/security/cve/cve-2016-2568 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062 https://bugzilla.redhat.com/show_bug.cgi?id=1300746 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568 https://lore.kernel.org/patchwork/patch/793178/ https://nvd.nist.gov/vuln/detail/CVE-2016-2568 https://ubuntu.com/security/CVE-2016-2568
|
libpolkit-gobject-1-0 |
CVE-2016-2568 |
LOW |
0.105-26ubuntu1.3 |
|
Expand...http://seclists.org/oss-sec/2016/q1/443 http://www.openwall.com/lists/oss-security/2016/02/26/3 https://access.redhat.com/security/cve/CVE-2016-2568 https://access.redhat.com/security/cve/cve-2016-2568 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062 https://bugzilla.redhat.com/show_bug.cgi?id=1300746 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568 https://lore.kernel.org/patchwork/patch/793178/ https://nvd.nist.gov/vuln/detail/CVE-2016-2568 https://ubuntu.com/security/CVE-2016-2568
|
libpython2.7-minimal |
CVE-2015-20107 |
LOW |
2.7.18-1~20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
libpython2.7-stdlib |
CVE-2015-20107 |
LOW |
2.7.18-1~20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
libpython3.8-minimal |
CVE-2015-20107 |
LOW |
3.8.10-0ubuntu1~20.04.4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
libpython3.8-stdlib |
CVE-2015-20107 |
LOW |
3.8.10-0ubuntu1~20.04.4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
libroken18-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libsqlite3-0 |
CVE-2020-9794 |
MEDIUM |
3.31.1-4ubuntu0.2 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/HT211168 https://support.apple.com/HT211170 https://support.apple.com/HT211171 https://support.apple.com/HT211175 https://support.apple.com/HT211178 https://support.apple.com/HT211179 https://support.apple.com/HT211181 https://vuldb.com/?id.155768
|
libsqlite3-0 |
CVE-2020-9849 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 https://support.apple.com/en-us/HT211935 https://support.apple.com/en-us/HT211952 https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
|
libsqlite3-0 |
CVE-2020-9991 |
LOW |
3.31.1-4ubuntu0.2 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211847 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 https://support.apple.com/kb/HT211846 https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
|
libsqlite3-0 |
CVE-2021-36690 |
LOW |
3.31.1-4ubuntu0.2 |
3.31.1-4ubuntu0.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690 https://nvd.nist.gov/vuln/detail/CVE-2021-36690 https://ubuntu.com/security/notices/USN-5403-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.sqlite.org/forum/forumpost/718c0a8d17
|
libss2 |
CVE-2022-1304 |
MEDIUM |
1.45.5-2ubuntu1 |
1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304 https://bugzilla.redhat.com/show_bug.cgi?id=2069726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304 https://marc.info/?l=linux-ext4&m=165056234501732&w=2 https://nvd.nist.gov/vuln/detail/CVE-2022-1304 https://ubuntu.com/security/notices/USN-5464-1
|
libssl1.1 |
CVE-2022-1292 |
MEDIUM |
1.1.1f-1ubuntu2.12 |
1.1.1f-1ubuntu2.13 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23 https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/ https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html https://nvd.nist.gov/vuln/detail/CVE-2022-1292 https://security.netapp.com/advisory/ntap-20220602-0009/ https://ubuntu.com/security/notices/USN-5402-1 https://ubuntu.com/security/notices/USN-5402-2 https://www.debian.org/security/2022/dsa-5139 https://www.openssl.org/news/secadv/20220503.txt
|
libssl1.1 |
CVE-2022-2068 |
MEDIUM |
1.1.1f-1ubuntu2.12 |
1.1.1f-1ubuntu2.15 |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7 https://ubuntu.com/security/notices/USN-5488-1 https://www.openssl.org/news/secadv/20220621.txt
|
libstdc++-9-dev |
CVE-2020-13844 |
MEDIUM |
9.4.0-1ubuntu1~20.04.1 |
|
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html https://access.redhat.com/security/cve/CVE-2020-13844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
|
libtiff5 |
CVE-2022-0865 |
MEDIUM |
4.1.0+git191117-2ubuntu0.20.04.2 |
4.1.0+git191117-2ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0865 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067 https://gitlab.com/libtiff/libtiff/-/issues/385 https://gitlab.com/libtiff/libtiff/-/merge_requests/306 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/ https://nvd.nist.gov/vuln/detail/CVE-2022-0865 https://ubuntu.com/security/notices/USN-5421-1 https://www.debian.org/security/2022/dsa-5108
|
libtiff5 |
CVE-2022-0891 |
MEDIUM |
4.1.0+git191117-2ubuntu0.20.04.2 |
4.1.0+git191117-2ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0891 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891 https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c https://gitlab.com/libtiff/libtiff/-/issues/380 https://gitlab.com/libtiff/libtiff/-/issues/382 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/ https://nvd.nist.gov/vuln/detail/CVE-2022-0891 https://ubuntu.com/security/notices/USN-5421-1 https://www.debian.org/security/2022/dsa-5108
|
libtiff5 |
CVE-2022-1354 |
MEDIUM |
4.1.0+git191117-2ubuntu0.20.04.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1354 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354 https://gitlab.com/libtiff/libtiff/-/issues/319
|
libtiff5 |
CVE-2018-10126 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.2 |
|
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786 https://access.redhat.com/security/cve/CVE-2018-10126 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
libtiff5 |
CVE-2020-35522 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.2 |
4.1.0+git191117-2ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-35522 https://bugzilla.redhat.com/show_bug.cgi?id=1932037 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522 https://gitlab.com/libtiff/libtiff/-/merge_requests/165 https://linux.oracle.com/cve/CVE-2020-35522.html https://linux.oracle.com/errata/ELSA-2021-4241.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ https://nvd.nist.gov/vuln/detail/CVE-2020-35522 https://security.gentoo.org/glsa/202104-06 https://security.netapp.com/advisory/ntap-20210521-0009/ https://ubuntu.com/security/notices/USN-5421-1
|
libtiff5 |
CVE-2022-0561 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.2 |
4.1.0+git191117-2ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0561 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561 https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ https://nvd.nist.gov/vuln/detail/CVE-2022-0561 https://security.netapp.com/advisory/ntap-20220318-0001/ https://ubuntu.com/security/notices/USN-5421-1 https://www.debian.org/security/2022/dsa-5108
|
libtiff5 |
CVE-2022-0562 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.2 |
4.1.0+git191117-2ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562 https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json https://gitlab.com/libtiff/libtiff/-/issues/362 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/ https://nvd.nist.gov/vuln/detail/CVE-2022-0562 https://security.netapp.com/advisory/ntap-20220318-0001/ https://ubuntu.com/security/notices/USN-5421-1 https://www.debian.org/security/2022/dsa-5108
|
libtiff5 |
CVE-2022-22844 |
LOW |
4.1.0+git191117-2ubuntu0.20.04.2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-22844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844 https://gitlab.com/libtiff/libtiff/-/issues/355 https://gitlab.com/libtiff/libtiff/-/merge_requests/287 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html https://nvd.nist.gov/vuln/detail/CVE-2022-22844 https://security.netapp.com/advisory/ntap-20220311-0002/ https://www.debian.org/security/2022/dsa-5108
|
libtinfo6 |
CVE-2021-39537 |
LOW |
6.2-0ubuntu2 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://access.redhat.com/security/cve/CVE-2021-39537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://ubuntu.com/security/notices/USN-5477-1
|
libtinfo6 |
CVE-2022-29458 |
LOW |
6.2-0ubuntu2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-29458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458 https://invisible-island.net/ncurses/NEWS.html#t20220416 https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://ubuntu.com/security/notices/USN-5477-1
|
libturbojpeg |
CVE-2021-46822 |
MEDIUM |
2.0.3-0ubuntu1.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-46822 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46822 https://exchange.xforce.ibmcloud.com/vulnerabilities/221567 https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2
|
libturbojpeg |
CVE-2020-17541 |
LOW |
2.0.3-0ubuntu1.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-17541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541 https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392 https://linux.oracle.com/cve/CVE-2020-17541.html https://linux.oracle.com/errata/ELSA-2021-4288.html https://nvd.nist.gov/vuln/detail/CVE-2020-17541
|
libturbojpeg0-dev |
CVE-2021-46822 |
MEDIUM |
2.0.3-0ubuntu1.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-46822 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46822 https://exchange.xforce.ibmcloud.com/vulnerabilities/221567 https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2
|
libturbojpeg0-dev |
CVE-2020-17541 |
LOW |
2.0.3-0ubuntu1.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-17541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541 https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392 https://linux.oracle.com/cve/CVE-2020-17541.html https://linux.oracle.com/errata/ELSA-2021-4288.html https://nvd.nist.gov/vuln/detail/CVE-2020-17541
|
libwind0-heimdal |
CVE-2021-3671 |
LOW |
7.7.0+dfsg-1ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3671 https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671 https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a https://nvd.nist.gov/vuln/detail/CVE-2021-3671 https://ubuntu.com/security/notices/USN-5142-1 https://ubuntu.com/security/notices/USN-5174-1
|
libxml2 |
CVE-2022-29824 |
MEDIUM |
2.9.10+dfsg-5ubuntu0.20.04.2 |
2.9.10+dfsg-5ubuntu0.20.04.3 |
Expand...http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html https://access.redhat.com/security/cve/CVE-2022-29824 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824 https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14) https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master) https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14 https://gitlab.gnome.org/GNOME/libxslt/-/tags https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/ https://nvd.nist.gov/vuln/detail/CVE-2022-29824 https://ubuntu.com/security/notices/USN-5422-1 https://www.debian.org/security/2022/dsa-5142
|
libxml2-dev |
CVE-2022-29824 |
MEDIUM |
2.9.10+dfsg-5ubuntu0.20.04.2 |
2.9.10+dfsg-5ubuntu0.20.04.3 |
Expand...http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html https://access.redhat.com/security/cve/CVE-2022-29824 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824 https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14) https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master) https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14 https://gitlab.gnome.org/GNOME/libxslt/-/tags https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/ https://nvd.nist.gov/vuln/detail/CVE-2022-29824 https://ubuntu.com/security/notices/USN-5422-1 https://www.debian.org/security/2022/dsa-5142
|
linux-libc-dev |
CVE-2022-1116 |
HIGH |
5.4.0-109.123 |
5.4.0-113.127 |
Expand...http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html https://access.redhat.com/security/cve/CVE-2022-1116 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1116 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/io_uring.c?h=v5.4.189&id=1a623d361ffe5cecd4244a02f449528416360038 https://kernel.dance/#1a623d361ffe5cecd4244a02f449528416360038 https://ubuntu.com/security/notices/USN-5442-1 https://ubuntu.com/security/notices/USN-5442-2
|
linux-libc-dev |
CVE-2022-21499 |
HIGH |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21499 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499 https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066 https://linux.oracle.com/cve/CVE-2022-21499.html https://linux.oracle.com/errata/ELSA-2022-9496.html https://ubuntu.com/security/notices/USN-5465-1 https://ubuntu.com/security/notices/USN-5466-1 https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5468-1 https://ubuntu.com/security/notices/USN-5469-1 https://ubuntu.com/security/notices/USN-5470-1 https://ubuntu.com/security/notices/USN-5471-1 https://ubuntu.com/security/notices/USN-5484-1 https://www.debian.org/security/2022/dsa-5161 https://www.openwall.com/lists/oss-security/2022/05/24/10 https://www.openwall.com/lists/oss-security/2022/05/24/7
|
linux-libc-dev |
CVE-2022-29581 |
HIGH |
5.4.0-109.123 |
5.4.0-113.127 |
Expand...http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html http://www.openwall.com/lists/oss-security/2022/05/18/2 https://access.redhat.com/security/cve/CVE-2022-29581 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8 https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8 https://nvd.nist.gov/vuln/detail/CVE-2022-29581 https://ubuntu.com/security/notices/USN-5442-1 https://ubuntu.com/security/notices/USN-5442-2 https://ubuntu.com/security/notices/USN-5443-1 https://ubuntu.com/security/notices/USN-5443-2 https://ubuntu.com/security/notices/USN-5444-1
|
linux-libc-dev |
CVE-2013-7445 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2013-7445 https://bugzilla.kernel.org/show_bug.cgi?id=60533 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445 https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
|
linux-libc-dev |
CVE-2015-8553 |
MEDIUM |
5.4.0-109.123 |
|
Expand...http://thread.gmane.org/gmane.linux.kernel/1924087/focus=1930758 (regression mention) http://xenbits.xen.org/xsa/advisory-120.html https://access.redhat.com/security/cve/CVE-2015-8553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553 https://seclists.org/bugtraq/2019/Aug/18 https://www.debian.org/security/2019/dsa-4497
|
linux-libc-dev |
CVE-2016-8660 |
MEDIUM |
5.4.0-109.123 |
|
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8 http://www.securityfocus.com/bid/93558 https://access.redhat.com/security/cve/CVE-2016-8660 https://bugzilla.redhat.com/show_bug.cgi?id=1384851 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660 https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/ https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2 https://marc.info/?l=linux-xfs&m=149498118228320&w=2
|
linux-libc-dev |
CVE-2018-17977 |
MEDIUM |
5.4.0-109.123 |
|
Expand...http://www.securityfocus.com/bid/105539 https://access.redhat.com/security/cve/CVE-2018-17977 https://bugzilla.suse.com/show_bug.cgi?id=1111609 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977 https://www.openwall.com/lists/oss-security/2018/10/05/5
|
linux-libc-dev |
CVE-2020-12362 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-12362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362 https://linux.oracle.com/cve/CVE-2020-12362.html https://linux.oracle.com/errata/ELSA-2021-9434.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
|
linux-libc-dev |
CVE-2020-24504 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-24504 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504 https://linux.oracle.com/cve/CVE-2020-24504.html https://linux.oracle.com/errata/ELSA-2021-4356.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
|
linux-libc-dev |
CVE-2020-27835 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-27835 https://bugzilla.redhat.com/show_bug.cgi?id=1901709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835 https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79 https://linux.oracle.com/cve/CVE-2020-27835.html https://linux.oracle.com/errata/ELSA-2021-1578.html https://ubuntu.com/security/notices/USN-4751-1
|
linux-libc-dev |
CVE-2020-36310 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-36310 https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310 https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e https://linux.oracle.com/cve/CVE-2020-36310.html https://linux.oracle.com/errata/ELSA-2021-9307.html https://www.debian.org/security/2022/dsa-5095
|
linux-libc-dev |
CVE-2021-20320 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-20320 https://bugzilla.redhat.com/show_bug.cgi?id=2010090 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320 https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/ https://nvd.nist.gov/vuln/detail/CVE-2021-20320
|
linux-libc-dev |
CVE-2021-26401 |
MEDIUM |
5.4.0-109.123 |
5.4.0-110.124 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2 https://access.redhat.com/security/cve/CVE-2021-26401 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26401 https://errata.almalinux.org/8/ALSA-2022-1988.html https://linux.oracle.com/cve/CVE-2021-26401.html https://linux.oracle.com/errata/ELSA-2022-9314.html https://ubuntu.com/security/notices/USN-5415-1 https://ubuntu.com/security/notices/USN-5417-1 https://ubuntu.com/security/notices/USN-5418-1 https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036
|
linux-libc-dev |
CVE-2021-33061 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-33061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33061 https://security.netapp.com/advisory/ntap-20220210-0010/ https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00571.html
|
linux-libc-dev |
CVE-2021-3864 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-3864 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864 https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/ https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com https://www.openwall.com/lists/oss-security/2021/10/20/2
|
linux-libc-dev |
CVE-2021-39800 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39800 https://source.android.com/security/bulletin/2022-04-01
|
linux-libc-dev |
CVE-2021-39801 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39801 https://source.android.com/security/bulletin/2022-04-01
|
linux-libc-dev |
CVE-2021-39802 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39802 https://lore.kernel.org/all/CAHk-=wj4KCujAH_oPh40Bkp48amM4MXr+8AcbZ=qd5LF4Q+TDg@mail.gmail.com/#t https://source.android.com/security/bulletin/2022-04-01
|
linux-libc-dev |
CVE-2021-4001 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4001 https://bugzilla.redhat.com/show_bug.cgi?id=2025645 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4001 https://git.kernel.org/linus/353050be4c19e102178ccc05988101887c25ae53 https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53 https://nvd.nist.gov/vuln/detail/CVE-2021-4001 https://ubuntu.com/security/notices/USN-5207-1 https://ubuntu.com/security/notices/USN-5265-1 https://ubuntu.com/security/notices/USN-5278-1
|
linux-libc-dev |
CVE-2021-4148 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4148 https://bugzilla.redhat.com/show_bug.cgi?id=2026487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148 https://lkml.org/lkml/2021/9/12/323 https://lkml.org/lkml/2021/9/17/1037 https://lore.kernel.org/linux-mm/a07564a3-b2fc-9ffe-3ace-3f276075ea5c@google.com/ https://lore.kernel.org/lkml/CACkBjsYwLYLRmX8GpsDpMthagWOjWWrNxqY6ZLNQVr6yx+f5vA@mail.gmail.com/ https://lore.kernel.org/lkml/CAHbLzkrdGva2dzO36r62LKv_ip5trbMK0BO3vCeSBk2_7OE-zA@mail.gmail.com/ https://nvd.nist.gov/vuln/detail/CVE-2021-4148
|
linux-libc-dev |
CVE-2021-4150 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4150 https://bugzilla.redhat.com/show_bug.cgi?id=2025938 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4150 https://git.kernel.org/linus/9fbfabfda25d8774c5a08634fdd2da000a924890 (5.15-rc7) https://lkml.org/lkml/2021/10/18/485 https://lkml.org/lkml/2021/9/6/781 https://nvd.nist.gov/vuln/detail/CVE-2021-4150
|
linux-libc-dev |
CVE-2021-4159 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4159 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159
|
linux-libc-dev |
CVE-2021-4197 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4197 https://bugzilla.redhat.com/show_bug.cgi?id=2035652 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197 https://errata.almalinux.org/8/ALSA-2022-1988.html https://linux.oracle.com/cve/CVE-2021-4197.html https://linux.oracle.com/errata/ELSA-2022-9480.html https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/ https://nvd.nist.gov/vuln/detail/CVE-2021-4197 https://security.netapp.com/advisory/ntap-20220602-0006/ https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5368-1 https://ubuntu.com/security/notices/USN-5467-1 https://www.debian.org/security/2022/dsa-5127
|
linux-libc-dev |
CVE-2021-4218 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4218
|
linux-libc-dev |
CVE-2021-44879 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-44879 https://bugzilla.kernel.org/show_bug.cgi?id=215231 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f https://lkml.org/lkml/2022/1/24/4067 https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/ https://nvd.nist.gov/vuln/detail/CVE-2021-44879 https://ubuntu.com/security/notices/USN-5302-1 https://ubuntu.com/security/notices/USN-5383-1 https://www.openwall.com/lists/oss-security/2022/02/12/1
|
linux-libc-dev |
CVE-2022-0168 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0168 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168 https://ubuntu.com/security/notices/USN-5469-1
|
linux-libc-dev |
CVE-2022-0382 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0382 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0382 https://github.com/torvalds/linux/commit/d6d86830705f173fca6087a3e67ceaf68db80523 https://nvd.nist.gov/vuln/detail/CVE-2022-0382 https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5368-1
|
linux-libc-dev |
CVE-2022-0400 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0400 https://bugzilla.redhat.com/show_bug.cgi?id=2040604 https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public) https://bugzilla.redhat.com/show_bug.cgi?id=2044575 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400
|
linux-libc-dev |
CVE-2022-0480 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0480 https://bugzilla.redhat.com/show_bug.cgi?id=2049700 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480 https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1) https://github.com/kata-containers/kata-containers/issues/3373 https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
|
linux-libc-dev |
CVE-2022-0494 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0494 https://bugzilla.redhat.com/show_bug.cgi?id=2039448 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494 https://git.kernel.org/linus/cc8f7fe1f5eab010191aa4570f27641876fa1267 (5.17-rc5) https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/ https://nvd.nist.gov/vuln/detail/CVE-2022-0494 https://ubuntu.com/security/notices/USN-5381-1 https://www.debian.org/security/2022/dsa-5161
|
linux-libc-dev |
CVE-2022-0998 |
MEDIUM |
5.4.0-109.123 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/04/02/1 https://access.redhat.com/security/cve/CVE-2022-0998 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-0998 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0998 https://git.kernel.org/linus/870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0 (5.17-rc1) https://lore.kernel.org/netdev/20220123001216.2460383-13-sashal@kernel.org/ https://nvd.nist.gov/vuln/detail/CVE-2022-0998 https://security.netapp.com/advisory/ntap-20220513-0003/
|
linux-libc-dev |
CVE-2022-1011 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1011 https://bugzilla.redhat.com/show_bug.cgi?id=2064855 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/linus/0c4bcfdecb1ac0967619ee7ff44871d93c08c909 (5.17-rc8) https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next https://linux.oracle.com/cve/CVE-2022-1011.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/ https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/ https://nvd.nist.gov/vuln/detail/CVE-2022-1011 https://ubuntu.com/security/notices/USN-5381-1 https://ubuntu.com/security/notices/USN-5467-1
|
linux-libc-dev |
CVE-2022-1012 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1012 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012 https://git.kernel.org/linus/b2d057560b8107c633b39aabe517ff9d93f285e3 (5.18-rc6) https://kernel.googlesource.com/pub/scm/linux/kernel/git/jkirsher/net-queue/+/b2d057560b8107c633b39aabe517ff9d93f285e3%5E%21/ https://ubuntu.com/security/notices/USN-5471-1
|
linux-libc-dev |
CVE-2022-1016 |
MEDIUM |
5.4.0-109.123 |
5.4.0-110.124 |
Expand...http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/ https://access.redhat.com/security/cve/CVE-2022-1016 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016 https://linux.oracle.com/cve/CVE-2022-1016.html https://linux.oracle.com/errata/ELSA-2022-9368.html https://seclists.org/oss-sec/2022/q1/205 https://ubuntu.com/security/notices/USN-5381-1 https://ubuntu.com/security/notices/USN-5383-1 https://ubuntu.com/security/notices/USN-5390-1 https://ubuntu.com/security/notices/USN-5390-2 https://ubuntu.com/security/notices/USN-5415-1 https://ubuntu.com/security/notices/USN-5466-1 https://www.openwall.com/lists/oss-security/2022/03/28/5
|
linux-libc-dev |
CVE-2022-1048 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1048 https://bugzilla.redhat.com/show_bug.cgi?id=2066706 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048 https://linux.oracle.com/cve/CVE-2022-1048.html https://linux.oracle.com/errata/ELSA-2022-9480.html https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3 https://nvd.nist.gov/vuln/detail/CVE-2022-1048 https://ubuntu.com/security/notices/USN-5381-1 https://ubuntu.com/security/notices/USN-5469-1 https://www.debian.org/security/2022/dsa-5127 https://www.openwall.com/lists/oss-security/2022/03/28/4
|
linux-libc-dev |
CVE-2022-1158 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1158 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158 https://linux.oracle.com/cve/CVE-2022-1158.html https://linux.oracle.com/errata/ELSA-2022-9368.html https://seclists.org/oss-sec/2022/q2/22 https://ubuntu.com/security/notices/USN-5416-1 https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5468-1 https://ubuntu.com/security/notices/USN-5469-1 https://www.openwall.com/lists/oss-security/2022/04/08/4
|
linux-libc-dev |
CVE-2022-1195 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1195 https://bugzilla.redhat.com/show_bug.cgi?id=2056381 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b9111922b1f399aba6ed1e1b8f2079c3da1aed8 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e0588c291d6ce225f2b891753ca41d45ba42469 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b2f37aead1b82a770c48b5d583f35ec22aabb61e https://nvd.nist.gov/vuln/detail/CVE-2022-1195 https://ubuntu.com/security/notices/USN-5469-1 https://www.debian.org/security/2022/dsa-5127
|
linux-libc-dev |
CVE-2022-1198 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1198 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198 https://github.com/torvalds/linux/commit/efe4186e6a1b54bf38b9e05450d43b0da1fd7739 https://marc.info/?i=c012878.3292f.17fe9417790.Coremail.duoming@zju.edu.cn https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5469-1
|
linux-libc-dev |
CVE-2022-1263 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1263 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263 https://ubuntu.com/security/notices/USN-5469-1 https://www.openwall.com/lists/oss-security/2022/04/07/1 https://www.spinics.net/lists/kvm/msg273052.html
|
linux-libc-dev |
CVE-2022-1353 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1353 https://bugzilla.redhat.com/show_bug.cgi?id=2066819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353 https://git.kernel.org/linus/9a564bccb78a76740ea9d75a259942df8143d02c (5.17) https://github.com/torvalds/linux/commit/9a564bccb78a76740ea9d75a259942df8143d02c https://linux.oracle.com/cve/CVE-2022-1353.html https://linux.oracle.com/errata/ELSA-2022-9480.html https://nvd.nist.gov/vuln/detail/CVE-2022-1353 https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5469-1 https://www.debian.org/security/2022/dsa-5127
|
linux-libc-dev |
CVE-2022-1508 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1508 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1508 https://git.kernel.org/linus/89c2b3b74918200e46699338d7bcc19b1ea12110 (5.15-rc1) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110
|
linux-libc-dev |
CVE-2022-1516 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...http://www.openwall.com/lists/oss-security/2022/06/19/1 https://access.redhat.com/security/cve/CVE-2022-1516 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7781607938c8 https://ubuntu.com/security/notices/USN-5416-1 https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5469-1
|
linux-libc-dev |
CVE-2022-1652 |
MEDIUM |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1652 https://bugzilla.redhat.com/show_bug.cgi?id=1832397 https://bugzilla.redhat.com/show_bug.cgi?id=2084458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652 https://francozappa.github.io/about-bias/ https://kb.cert.org/vuls/id/647177/ https://nvd.nist.gov/vuln/detail/CVE-2022-1652 https://www.openwall.com/lists/oss-security/2022/05/10/1 https://www.openwall.com/lists/oss-security/2022/05/10/2
|
linux-libc-dev |
CVE-2022-1734 |
MEDIUM |
5.4.0-109.123 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/06/05/4 http://www.openwall.com/lists/oss-security/2022/06/09/1 https://access.redhat.com/security/cve/CVE-2022-1734 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734 https://git.kernel.org/linus/d270453a0d9ec10bb8a802a142fb1b3601a83098 (5.18-rc6) https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098 https://nvd.nist.gov/vuln/detail/CVE-2022-1734 https://ubuntu.com/security/notices/USN-5471-1
|
linux-libc-dev |
CVE-2022-20008 |
MEDIUM |
5.4.0-109.123 |
5.4.0-110.124 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20008 https://git.kernel.org/linus/54309fde1a352ad2674ebba004a79f7d20b9f037 (5.17-rc5) https://source.android.com/security/bulletin/2022-05-01 https://ubuntu.com/security/notices/USN-5415-1 https://ubuntu.com/security/notices/USN-5417-1
|
linux-libc-dev |
CVE-2022-21123 |
MEDIUM |
5.4.0-109.123 |
5.4.0-120.136 |
Expand...INTEL-TA-00615 http://www.openwall.com/lists/oss-security/2022/06/16/1 https://access.redhat.com/security/cve/CVE-2022-21123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123 https://linux.oracle.com/cve/CVE-2022-21123.html https://linux.oracle.com/errata/ELSA-2022-9508.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/ https://security.netapp.com/advisory/ntap-20220624-0008/ https://ubuntu.com/security/notices/USN-5484-1 https://ubuntu.com/security/notices/USN-5485-1 https://ubuntu.com/security/notices/USN-5486-1 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#SBDR https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html https://xenbits.xen.org/xsa/advisory-404.html
|
linux-libc-dev |
CVE-2022-21125 |
MEDIUM |
5.4.0-109.123 |
5.4.0-120.136 |
Expand...INTEL-TA-00615 http://www.openwall.com/lists/oss-security/2022/06/16/1 http://xenbits.xen.org/xsa/advisory-404.html https://access.redhat.com/security/cve/CVE-2022-21125 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125 https://linux.oracle.com/cve/CVE-2022-21125.html https://linux.oracle.com/errata/ELSA-2022-9508.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/ https://security.netapp.com/advisory/ntap-20220624-0008/ https://ubuntu.com/security/notices/USN-5484-1 https://ubuntu.com/security/notices/USN-5485-1 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#SBDS https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html https://xenbits.xen.org/xsa/advisory-404.html
|
linux-libc-dev |
CVE-2022-21166 |
MEDIUM |
5.4.0-109.123 |
5.4.0-120.136 |
Expand...INTEL-TA-00615 http://www.openwall.com/lists/oss-security/2022/06/16/1 https://access.redhat.com/security/cve/CVE-2022-21166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166 https://linux.oracle.com/cve/CVE-2022-21166.html https://linux.oracle.com/errata/ELSA-2022-9508.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/ https://security.netapp.com/advisory/ntap-20220624-0008/ https://ubuntu.com/security/notices/USN-5484-1 https://ubuntu.com/security/notices/USN-5485-1 https://ubuntu.com/security/notices/USN-5486-1 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#DRPW https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html https://xenbits.xen.org/xsa/advisory-404.html
|
linux-libc-dev |
CVE-2022-23036 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036 https://linux.oracle.com/cve/CVE-2022-23036.html https://linux.oracle.com/errata/ELSA-2022-9480.html https://ubuntu.com/security/notices/USN-5418-1 https://ubuntu.com/security/notices/USN-5467-1 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-23037 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037 https://linux.oracle.com/cve/CVE-2022-23037.html https://linux.oracle.com/errata/ELSA-2022-9480.html https://ubuntu.com/security/notices/USN-5418-1 https://ubuntu.com/security/notices/USN-5467-1 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-23038 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038 https://linux.oracle.com/cve/CVE-2022-23038.html https://linux.oracle.com/errata/ELSA-2022-9480.html https://ubuntu.com/security/notices/USN-5418-1 https://ubuntu.com/security/notices/USN-5467-1 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-23039 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039 https://linux.oracle.com/cve/CVE-2022-23039.html https://linux.oracle.com/errata/ELSA-2022-9480.html https://ubuntu.com/security/notices/USN-5418-1 https://ubuntu.com/security/notices/USN-5467-1 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-23040 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040 https://linux.oracle.com/cve/CVE-2022-23040.html https://linux.oracle.com/errata/ELSA-2022-9480.html https://ubuntu.com/security/notices/USN-5418-1 https://ubuntu.com/security/notices/USN-5467-1 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-23041 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041 https://linux.oracle.com/cve/CVE-2022-23041.html https://linux.oracle.com/errata/ELSA-2022-9480.html https://ubuntu.com/security/notices/USN-5467-1 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-23042 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042 https://linux.oracle.com/cve/CVE-2022-23042.html https://linux.oracle.com/errata/ELSA-2022-9480.html https://ubuntu.com/security/notices/USN-5418-1 https://ubuntu.com/security/notices/USN-5467-1 https://xenbits.xen.org/xsa/advisory-396.html https://xenbits.xenproject.org/xsa/advisory-396.txt
|
linux-libc-dev |
CVE-2022-24958 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-24958 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda https://github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74 https://github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/ https://nvd.nist.gov/vuln/detail/CVE-2022-24958 https://security.netapp.com/advisory/ntap-20220225-0008/ https://ubuntu.com/security/notices/USN-5381-1 https://ubuntu.com/security/notices/USN-5418-1 https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5468-1
|
linux-libc-dev |
CVE-2022-25258 |
MEDIUM |
5.4.0-109.123 |
5.4.0-110.124 |
Expand...https://access.redhat.com/security/cve/CVE-2022-25258 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258 https://github.com/szymonh/d-os-descriptor https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/ https://nvd.nist.gov/vuln/detail/CVE-2022-25258 https://ubuntu.com/security/notices/USN-5415-1 https://ubuntu.com/security/notices/USN-5417-1 https://ubuntu.com/security/notices/USN-5418-1 https://www.debian.org/security/2022/dsa-5092 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2022-25375 |
MEDIUM |
5.4.0-109.123 |
5.4.0-110.124 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/21/1 https://access.redhat.com/security/cve/CVE-2022-25375 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375 https://git.kernel.org/linus/38ea1eac7d88072bbffb630e2b3db83ca649b826 (5.17-rc4) https://github.com/szymonh/rndis-co https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2022-25375 https://ubuntu.com/security/notices/USN-5415-1 https://ubuntu.com/security/notices/USN-5417-1 https://ubuntu.com/security/notices/USN-5418-1 https://www.debian.org/security/2022/dsa-5092 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2022-26490 |
MEDIUM |
5.4.0-109.123 |
5.4.0-110.124 |
Expand...https://access.redhat.com/security/cve/CVE-2022-26490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490 https://git.kernel.org/linux/4fbcc1a4cb20fe26ad0225679c536c80f1648221 (5.17-rc1) https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/ https://nvd.nist.gov/vuln/detail/CVE-2022-26490 https://security.netapp.com/advisory/ntap-20220429-0004/ https://ubuntu.com/security/notices/USN-5381-1 https://ubuntu.com/security/notices/USN-5390-1 https://ubuntu.com/security/notices/USN-5390-2 https://ubuntu.com/security/notices/USN-5413-1 https://ubuntu.com/security/notices/USN-5415-1 https://ubuntu.com/security/notices/USN-5417-1 https://ubuntu.com/security/notices/USN-5418-1 https://www.debian.org/security/2022/dsa-5127
|
linux-libc-dev |
CVE-2022-26966 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-26966 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26966 https://git.kernel.org/linus/e9da0b56fe27206b49f39805f7dcda8a89379062 (5.17-rc6) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062 https://linux.oracle.com/cve/CVE-2022-26966.html https://linux.oracle.com/errata/ELSA-2022-9314.html https://nvd.nist.gov/vuln/detail/CVE-2022-26966 https://security.netapp.com/advisory/ntap-20220419-0001/ https://ubuntu.com/security/notices/USN-5381-1 https://ubuntu.com/security/notices/USN-5417-1 https://ubuntu.com/security/notices/USN-5418-1 https://ubuntu.com/security/notices/USN-5467-1
|
linux-libc-dev |
CVE-2022-28389 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28389 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389 https://git.kernel.org/linus/04c9b00ba83594a29813d6b1fb8fdc93a3915174 (5.18-rc1) https://github.com/torvalds/linux/commit/04c9b00ba83594a29813d6b1fb8fdc93a3915174 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/ https://nvd.nist.gov/vuln/detail/CVE-2022-28389 https://security.netapp.com/advisory/ntap-20220513-0001/ https://ubuntu.com/security/notices/USN-5416-1 https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5469-1 https://www.debian.org/security/2022/dsa-5127
|
linux-libc-dev |
CVE-2022-28390 |
MEDIUM |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28390 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390 https://git.kernel.org/linus/c70222752228a62135cee3409dccefd494a24646 (5.18-rc1) https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/ https://nvd.nist.gov/vuln/detail/CVE-2022-28390 https://security.netapp.com/advisory/ntap-20220513-0001/ https://ubuntu.com/security/notices/USN-5413-1 https://ubuntu.com/security/notices/USN-5416-1 https://ubuntu.com/security/notices/USN-5466-1 https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5468-1 https://ubuntu.com/security/notices/USN-5469-1 https://www.debian.org/security/2022/dsa-5127
|
linux-libc-dev |
CVE-2022-28893 |
MEDIUM |
5.4.0-109.123 |
|
Expand...http://www.openwall.com/lists/oss-security/2022/04/11/3 http://www.openwall.com/lists/oss-security/2022/04/11/4 http://www.openwall.com/lists/oss-security/2022/04/11/5 https://access.redhat.com/security/cve/CVE-2022-28893 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a https://github.com/torvalds/linux/commit/f00432063db1a0db484e85193eccc6845435b80e https://nvd.nist.gov/vuln/detail/CVE-2022-28893 https://security.netapp.com/advisory/ntap-20220526-0002/ https://www.debian.org/security/2022/dsa-5161 https://www.openwall.com/lists/oss-security/2022/04/11/3 https://www.openwall.com/lists/oss-security/2022/04/11/5
|
linux-libc-dev |
CVE-2022-30594 |
MEDIUM |
5.4.0-109.123 |
5.4.0-113.127 |
Expand...http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html https://access.redhat.com/security/cve/CVE-2022-30594 https://bugs.chromium.org/p/project-zero/issues/detail?id=2276 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee1fee900537b5d9560e9f937402de5ddc8412f3 https://git.kernel.org/linus/ee1fee900537b5d9560e9f937402de5ddc8412f3 (5.18-rc1) https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3 https://nvd.nist.gov/vuln/detail/CVE-2022-30594 https://ubuntu.com/security/notices/USN-5442-1 https://ubuntu.com/security/notices/USN-5442-2 https://ubuntu.com/security/notices/USN-5443-1 https://ubuntu.com/security/notices/USN-5443-2 https://ubuntu.com/security/notices/USN-5465-1
|
linux-libc-dev |
CVE-2017-0537 |
LOW |
5.4.0-109.123 |
|
Expand...http://www.securityfocus.com/bid/96831 http://www.securitytracker.com/id/1037968 https://android.googlesource.com/kernel/tegra.git/+/389b185cb2f17fff994dbdf8d4bac003d4b2b6b3%5E%21/#F0 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0537 https://lore.kernel.org/lkml/1484647168-30135-1-git-send-email-jilin@nvidia.com/#t https://source.android.com/security/bulletin/2017-01-01.html https://source.android.com/security/bulletin/2017-03-01 https://source.android.com/security/bulletin/2017-03-01.html
|
linux-libc-dev |
CVE-2017-13165 |
LOW |
5.4.0-109.123 |
|
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13165 https://github.com/aosp-mirror/platform_system_core/commit/15ffc53f6d57a46e3041453865311035a18e047a https://source.android.com/security/bulletin/pixel/2017-12-01
|
linux-libc-dev |
CVE-2017-13693 |
LOW |
5.4.0-109.123 |
|
Expand...http://www.securityfocus.com/bid/100502 https://access.redhat.com/security/cve/CVE-2017-13693 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693 https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732 https://patchwork.kernel.org/patch/9919053/
|
linux-libc-dev |
CVE-2018-1121 |
LOW |
5.4.0-109.123 |
|
Expand...http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 https://access.redhat.com/security/cve/CVE-2018-1121 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121 https://www.exploit-db.com/exploits/44806/ https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
linux-libc-dev |
CVE-2018-12928 |
LOW |
5.4.0-109.123 |
|
Expand...http://www.securityfocus.com/bid/104593 https://access.redhat.com/security/cve/CVE-2018-12928 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928 https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/ https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
|
linux-libc-dev |
CVE-2018-12929 |
LOW |
5.4.0-109.123 |
|
Expand...http://www.securityfocus.com/bid/104588 https://access.redhat.com/errata/RHSA-2019:0641 https://access.redhat.com/security/cve/CVE-2018-12929 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12929 https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
|
linux-libc-dev |
CVE-2018-12930 |
LOW |
5.4.0-109.123 |
|
Expand...http://www.securityfocus.com/bid/104588 https://access.redhat.com/errata/RHSA-2019:0641 https://access.redhat.com/security/cve/CVE-2018-12930 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12930 https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
|
linux-libc-dev |
CVE-2018-12931 |
LOW |
5.4.0-109.123 |
|
Expand...http://www.securityfocus.com/bid/104588 https://access.redhat.com/errata/RHSA-2019:0641 https://access.redhat.com/security/cve/CVE-2018-12931 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12931 https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
|
linux-libc-dev |
CVE-2019-14899 |
LOW |
5.4.0-109.123 |
|
Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2020/Jul/23 http://seclists.org/fulldisclosure/2020/Jul/24 http://seclists.org/fulldisclosure/2020/Jul/25 http://seclists.org/fulldisclosure/2020/Nov/20 http://www.openwall.com/lists/oss-security/2020/08/13/2 http://www.openwall.com/lists/oss-security/2020/10/07/3 https://access.redhat.com/security/cve/CVE-2019-14899 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14899 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14899 https://openvpn.net/security-advisory/no-flaws-found-in-openvpn-software/ https://support.apple.com/kb/HT211288 https://support.apple.com/kb/HT211289 https://support.apple.com/kb/HT211290 https://support.apple.com/kb/HT211850 https://support.apple.com/kb/HT211931 https://www.openwall.com/lists/oss-security/2019/12/05/1
|
linux-libc-dev |
CVE-2019-15213 |
LOW |
5.4.0-109.123 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://www.openwall.com/lists/oss-security/2019/08/20/2 https://access.redhat.com/security/cve/CVE-2019-15213 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7 https://linux.oracle.com/cve/CVE-2019-15213.html https://linux.oracle.com/errata/ELSA-2019-4872.html https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/ https://security.netapp.com/advisory/ntap-20190905-0002/ https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
|
linux-libc-dev |
CVE-2019-16230 |
LOW |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-16230 https://bugzilla.suse.com/show_bug.cgi?id=1150468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230 https://lkml.org/lkml/2019/9/9/487 https://security.netapp.com/advisory/ntap-20191004-0001/
|
linux-libc-dev |
CVE-2019-19378 |
LOW |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-19378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378 https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378 https://security.netapp.com/advisory/ntap-20200103-0001/
|
linux-libc-dev |
CVE-2019-19814 |
LOW |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-19814 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814 https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814 https://security.netapp.com/advisory/ntap-20200103-0001/
|
linux-libc-dev |
CVE-2020-11725 |
LOW |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-11725 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725 https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474 https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/ https://nvd.nist.gov/vuln/detail/CVE-2020-11725 https://twitter.com/yabbadabbadrew/status/1248632267028582400
|
linux-libc-dev |
CVE-2020-12363 |
LOW |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-12363 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363 https://linux.oracle.com/cve/CVE-2020-12363.html https://linux.oracle.com/errata/ELSA-2021-2314.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
|
linux-libc-dev |
CVE-2020-12364 |
LOW |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-12364 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364 https://linux.oracle.com/cve/CVE-2020-12364.html https://linux.oracle.com/errata/ELSA-2021-2314.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
|
linux-libc-dev |
CVE-2020-14304 |
LOW |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-14304 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304 https://linux.oracle.com/cve/CVE-2020-14304.html https://linux.oracle.com/errata/ELSA-2021-9410.html https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
|
linux-libc-dev |
CVE-2020-27820 |
LOW |
5.4.0-109.123 |
5.4.0-110.124 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27820 https://bugzilla.redhat.com/show_bug.cgi?id=1901726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820 https://errata.almalinux.org/8/ALSA-2022-1988.html https://linux.oracle.com/cve/CVE-2020-27820.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/ https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/ https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/ https://lore.kernel.org/dri-devel/20201125202648.5220-1-jcline@redhat.com/ https://ubuntu.com/security/notices/USN-5265-1 https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5413-1 https://ubuntu.com/security/notices/USN-5415-1
|
linux-libc-dev |
CVE-2020-35501 |
LOW |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2020-35501 https://bugzilla.redhat.com/show_bug.cgi?id=1908577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501 https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html https://nvd.nist.gov/vuln/detail/CVE-2020-35501 https://www.openwall.com/lists/oss-security/2021/02/18/1
|
linux-libc-dev |
CVE-2021-26934 |
LOW |
5.4.0-109.123 |
|
Expand...http://xenbits.xen.org/xsa/advisory-363.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/ https://nvd.nist.gov/vuln/detail/CVE-2021-26934 https://security.netapp.com/advisory/ntap-20210326-0001/ https://www.openwall.com/lists/oss-security/2021/02/16/2 https://xenbits.xen.org/xsa/advisory-363.html
|
linux-libc-dev |
CVE-2021-32078 |
LOW |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-32078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1) https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f https://kirtikumarar.com/CVE-2021-32078.txt https://nvd.nist.gov/vuln/detail/CVE-2021-32078 https://security.netapp.com/advisory/ntap-20210813-0002/
|
linux-libc-dev |
CVE-2021-34981 |
LOW |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-34981 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981 https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
|
linux-libc-dev |
CVE-2021-3669 |
LOW |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json https://access.redhat.com/security/cve/CVE-2021-3669 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669 https://errata.almalinux.org/8/ALSA-2022-1988.html https://linux.oracle.com/cve/CVE-2021-3669.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
|
linux-libc-dev |
CVE-2021-3772 |
LOW |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json https://access.redhat.com/security/cve/CVE-2021-3772 https://bugzilla.redhat.com/show_bug.cgi?id=2000694 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df https://linux.oracle.com/cve/CVE-2021-3772.html https://linux.oracle.com/errata/ELSA-2022-9260.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-3772 https://ubuntu.com/security/CVE-2021-3772 https://ubuntu.com/security/notices/USN-5165-1 https://ubuntu.com/security/notices/USN-5265-1 https://ubuntu.com/security/notices/USN-5466-1 https://ubuntu.com/security/notices/USN-5467-1 https://www.debian.org/security/2022/dsa-5096
|
linux-libc-dev |
CVE-2022-0854 |
LOW |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0854 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13 https://nvd.nist.gov/vuln/detail/CVE-2022-0854 https://ubuntu.com/security/notices/USN-5381-1 https://www.debian.org/security/2022/dsa-5161
|
linux-libc-dev |
CVE-2022-1729 |
LOW |
5.4.0-109.123 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-1729 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729 https://github.com/torvalds/linux/commit/3ac6487e584a1eb54071dbe1212e05b884136704 https://linux.oracle.com/cve/CVE-2022-1729.html https://linux.oracle.com/errata/ELSA-2022-9413.html https://lore.kernel.org/all/20220520183806.GV2578@worktop.programming.kicks-ass.net/T/#u https://www.openwall.com/lists/oss-security/2022/05/20/2
|
linux-libc-dev |
CVE-2022-27223 |
LOW |
5.4.0-109.123 |
5.4.0-110.124 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27223 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27223 https://git.kernel.org/linus/7f14c7227f342d9932f9b918893c8814f86d2a0d (5.17-rc6) https://github.com/torvalds/linux/commit/7f14c7227f342d9932f9b918893c8814f86d2a0d https://nvd.nist.gov/vuln/detail/CVE-2022-27223 https://security.netapp.com/advisory/ntap-20220419-0001/ https://ubuntu.com/security/notices/USN-5381-1 https://ubuntu.com/security/notices/USN-5413-1 https://ubuntu.com/security/notices/USN-5415-1 https://ubuntu.com/security/notices/USN-5417-1 https://ubuntu.com/security/notices/USN-5418-1
|
linux-libc-dev |
CVE-2022-28356 |
LOW |
5.4.0-109.123 |
5.4.0-117.132 |
Expand...http://www.openwall.com/lists/oss-security/2022/04/06/1 https://access.redhat.com/security/cve/CVE-2022-28356 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356 https://git.kernel.org/linus/764f4eb6846f5475f1244767d24d25dd86528a4a https://github.com/torvalds/linux/commit/764f4eb6846f5475f1244767d24d25dd86528a4a https://nvd.nist.gov/vuln/detail/CVE-2022-28356 https://security.netapp.com/advisory/ntap-20220506-0006/ https://ubuntu.com/security/notices/USN-5381-1 https://ubuntu.com/security/notices/USN-5466-1 https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5469-1 https://www.debian.org/security/2022/dsa-5127 https://www.openwall.com/lists/oss-security/2022/04/06/1
|
locales |
CVE-2016-20013 |
LOW |
2.31-0ubuntu9.7 |
|
Expand...https://akkadia.org/drepper/SHA-crypt.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013 https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/ https://twitter.com/solardiz/status/795601240151457793
|
login |
CVE-2013-4235 |
LOW |
1:4.8.1-1ubuntu5.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2013-4235 https://access.redhat.com/security/cve/cve-2013-4235 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2013-4235
|
logsave |
CVE-2022-1304 |
MEDIUM |
1.45.5-2ubuntu1 |
1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304 https://bugzilla.redhat.com/show_bug.cgi?id=2069726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304 https://marc.info/?l=linux-ext4&m=165056234501732&w=2 https://nvd.nist.gov/vuln/detail/CVE-2022-1304 https://ubuntu.com/security/notices/USN-5464-1
|
nasm |
CVE-2018-1000667 |
LOW |
2.14.02-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-1000667 https://bugzilla.nasm.us/show_bug.cgi?id=3392507 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000667 https://github.com/cyrillos/nasm/issues/3
|
nasm |
CVE-2018-1000886 |
LOW |
2.14.02-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-1000886 https://bugzilla.nasm.us/show_bug.cgi?id=3392514 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000886
|
nasm |
CVE-2018-10016 |
LOW |
2.14.02-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-10016 https://bugzilla.nasm.us/show_bug.cgi?id=3392473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10016
|
nasm |
CVE-2018-10254 |
LOW |
2.14.02-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-10254 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10254 https://sourceforge.net/p/nasm/bugs/561/
|
nasm |
CVE-2018-10316 |
LOW |
2.14.02-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-10316 https://bugzilla.nasm.us/show_bug.cgi?id=3392474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10316
|
nasm |
CVE-2018-16382 |
LOW |
2.14.02-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-16382 https://bugzilla.nasm.us/show_bug.cgi?id=3392503 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16382
|
nasm |
CVE-2018-16517 |
LOW |
2.14.02-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html http://packetstormsecurity.com/files/152566/Netwide-Assembler-NASM-2.14rc15-Null-Pointer-Dereference.html https://access.redhat.com/security/cve/CVE-2018-16517 https://bugzilla.nasm.us/show_bug.cgi?id=3392513 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16517 https://fakhrizulkifli.github.io/CVE-2018-16517.html https://www.exploit-db.com/exploits/46726/
|
nasm |
CVE-2018-16999 |
LOW |
2.14.02-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-16999 https://bugzilla.nasm.us/show_bug.cgi?id=3392508 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16999
|
nasm |
CVE-2018-19209 |
LOW |
2.14.02-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-19209 https://bugzilla.suse.com/show_bug.cgi?id=1115797 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19209 https://repo.or.cz/nasm.git/commitdiff/e996d28c70d45008085322b442b44a9224308548
|
nasm |
CVE-2018-19213 |
LOW |
2.14.02-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-19213 https://bugzilla.nasm.us/show_bug.cgi?id=3392524 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19213
|
nasm |
CVE-2018-19214 |
LOW |
2.14.02-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-19214 https://bugzilla.nasm.us/show_bug.cgi?id=3392521 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19214 https://repo.or.cz/nasm.git/commit/661f723d39e03ca6eb05d7376a43ca33db478354
|
nasm |
CVE-2018-19215 |
LOW |
2.14.02-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-19215 https://bugzilla.nasm.us/show_bug.cgi?id=3392525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19215 https://repo.or.cz/nasm.git/commit/4b5b737d4991578b1918303dc0fd9c9ab5c7ce4f
|
nasm |
CVE-2018-19216 |
LOW |
2.14.02-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-19216 https://bugzilla.nasm.us/show_bug.cgi?id=3392424 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19216 https://repo.or.cz/nasm.git/commitdiff/9b7ee09abfd426b99aa1ea81d19a3b2818eeabf9
|
nasm |
CVE-2018-19755 |
LOW |
2.14.02-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-19755 https://bugzilla.nasm.us/show_bug.cgi?id=3392528 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19755 https://repo.or.cz/nasm.git/commit/3079f7966dbed4497e36d5067cbfd896a90358cb
|
nasm |
CVE-2018-20535 |
LOW |
2.14.02-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-20535 https://bugzilla.nasm.us/show_bug.cgi?id=3392530 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20535
|
nasm |
CVE-2018-20538 |
LOW |
2.14.02-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2018-20538 https://bugzilla.nasm.us/show_bug.cgi?id=3392531 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20538
|
nasm |
CVE-2018-8882 |
LOW |
2.14.02-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-8882 https://bugzilla.nasm.us/show_bug.cgi?id=3392445 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8882
|
nasm |
CVE-2018-8883 |
LOW |
2.14.02-1 |
|
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-8883 https://bugzilla.nasm.us/show_bug.cgi?id=3392447 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8883
|
nasm |
CVE-2019-6290 |
LOW |
2.14.02-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-6290 https://bugzilla.nasm.us/show_bug.cgi?id=3392548 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6290
|
nasm |
CVE-2019-6291 |
LOW |
2.14.02-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-6291 https://bugzilla.nasm.us/show_bug.cgi?id=3392549 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6291
|
nasm |
CVE-2019-7147 |
LOW |
2.14.02-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-7147 https://bugzilla.nasm.us/show_bug.cgi?id=3392544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7147
|
nasm |
CVE-2019-8343 |
LOW |
2.14.02-1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2019-8343 https://bugzilla.nasm.us/show_bug.cgi?id=3392556 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8343
|
ncurses-base |
CVE-2021-39537 |
LOW |
6.2-0ubuntu2 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://access.redhat.com/security/cve/CVE-2021-39537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://ubuntu.com/security/notices/USN-5477-1
|
ncurses-base |
CVE-2022-29458 |
LOW |
6.2-0ubuntu2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-29458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458 https://invisible-island.net/ncurses/NEWS.html#t20220416 https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://ubuntu.com/security/notices/USN-5477-1
|
ncurses-bin |
CVE-2021-39537 |
LOW |
6.2-0ubuntu2 |
|
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://access.redhat.com/security/cve/CVE-2021-39537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://ubuntu.com/security/notices/USN-5477-1
|
ncurses-bin |
CVE-2022-29458 |
LOW |
6.2-0ubuntu2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-29458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458 https://invisible-island.net/ncurses/NEWS.html#t20220416 https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html https://nvd.nist.gov/vuln/detail/CVE-2022-29458 https://ubuntu.com/security/notices/USN-5477-1
|
networkd-dispatcher |
CVE-2022-29799 |
HIGH |
2.1-2~ubuntu20.04.2 |
2.1-2~ubuntu20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29799 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29799 https://ubuntu.com/security/notices/USN-5395-1 https://ubuntu.com/security/notices/USN-5395-2 https://www.helpnetsecurity.com/2022/04/27/cve-2022-29799-cve-2022-29800/ https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/
|
openssh-client |
CVE-2020-14145 |
LOW |
1:8.2p1-4ubuntu0.4 |
|
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1 https://access.redhat.com/security/cve/CVE-2020-14145 https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145 https://docs.ssh-mitm.at/CVE-2020-14145.html https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1 https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py https://linux.oracle.com/cve/CVE-2020-14145.html https://linux.oracle.com/errata/ELSA-2021-4368.html https://nvd.nist.gov/vuln/detail/CVE-2020-14145 https://security.gentoo.org/glsa/202105-35 https://security.netapp.com/advisory/ntap-20200709-0004/ https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/ https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
|
openssh-client |
CVE-2021-41617 |
LOW |
1:8.2p1-4ubuntu0.4 |
|
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json https://access.redhat.com/security/cve/CVE-2021-41617 https://bugzilla.suse.com/show_bug.cgi?id=1190975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617 https://errata.almalinux.org/8/ALSA-2022-2013.html https://linux.oracle.com/cve/CVE-2021-41617.html https://linux.oracle.com/errata/ELSA-2022-2013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/ https://nvd.nist.gov/vuln/detail/CVE-2021-41617 https://security.netapp.com/advisory/ntap-20211014-0004/ https://www.openssh.com/security.html https://www.openssh.com/txt/release-8.8 https://www.openwall.com/lists/oss-security/2021/09/26/1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
openssl |
CVE-2022-1292 |
MEDIUM |
1.1.1f-1ubuntu2.12 |
1.1.1f-1ubuntu2.13 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23 https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/ https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html https://nvd.nist.gov/vuln/detail/CVE-2022-1292 https://security.netapp.com/advisory/ntap-20220602-0009/ https://ubuntu.com/security/notices/USN-5402-1 https://ubuntu.com/security/notices/USN-5402-2 https://www.debian.org/security/2022/dsa-5139 https://www.openssl.org/news/secadv/20220503.txt
|
openssl |
CVE-2022-2068 |
MEDIUM |
1.1.1f-1ubuntu2.12 |
1.1.1f-1ubuntu2.15 |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7 https://ubuntu.com/security/notices/USN-5488-1 https://www.openssl.org/news/secadv/20220621.txt
|
passwd |
CVE-2013-4235 |
LOW |
1:4.8.1-1ubuntu5.20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2013-4235 https://access.redhat.com/security/cve/cve-2013-4235 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2013-4235
|
patch |
CVE-2018-6952 |
LOW |
2.7.6-6 |
|
Expand...http://www.securityfocus.com/bid/103047 https://access.redhat.com/errata/RHSA-2019:2033 https://access.redhat.com/security/cve/CVE-2018-6952 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952 https://linux.oracle.com/cve/CVE-2018-6952.html https://linux.oracle.com/errata/ELSA-2019-2033.html https://nvd.nist.gov/vuln/detail/CVE-2018-6952 https://savannah.gnu.org/bugs/index.php?53133 https://security.gentoo.org/glsa/201904-17
|
patch |
CVE-2021-45261 |
LOW |
2.7.6-6 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-45261 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261 https://savannah.gnu.org/bugs/?61685
|
perl |
CVE-2020-16156 |
MEDIUM |
5.30.0-9ubuntu0.2 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://access.redhat.com/security/cve/CVE-2020-16156 https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
perl-base |
CVE-2020-16156 |
MEDIUM |
5.30.0-9ubuntu0.2 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://access.redhat.com/security/cve/CVE-2020-16156 https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
perl-modules-5.30 |
CVE-2020-16156 |
MEDIUM |
5.30.0-9ubuntu0.2 |
|
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://access.redhat.com/security/cve/CVE-2020-16156 https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
policykit-1 |
CVE-2016-2568 |
LOW |
0.105-26ubuntu1.3 |
|
Expand...http://seclists.org/oss-sec/2016/q1/443 http://www.openwall.com/lists/oss-security/2016/02/26/3 https://access.redhat.com/security/cve/CVE-2016-2568 https://access.redhat.com/security/cve/cve-2016-2568 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062 https://bugzilla.redhat.com/show_bug.cgi?id=1300746 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568 https://lore.kernel.org/patchwork/patch/793178/ https://nvd.nist.gov/vuln/detail/CVE-2016-2568 https://ubuntu.com/security/CVE-2016-2568
|
python2.7 |
CVE-2015-20107 |
LOW |
2.7.18-1~20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
python2.7-minimal |
CVE-2015-20107 |
LOW |
2.7.18-1~20.04.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
python3-urllib3 |
CVE-2021-33503 |
LOW |
1.25.8-2ubuntu0.1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-33503 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503 https://errata.almalinux.org/8/ALSA-2021-4162.html https://github.com/advisories/GHSA-q2q7-5pp4-w6pg https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg https://linux.oracle.com/cve/CVE-2021-33503.html https://linux.oracle.com/errata/ELSA-2021-4162.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/ https://nvd.nist.gov/vuln/detail/CVE-2021-33503 https://security.gentoo.org/glsa/202107-36 https://www.oracle.com/security-alerts/cpuoct2021.html
|
python3.8 |
CVE-2015-20107 |
LOW |
3.8.10-0ubuntu1~20.04.4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
python3.8-minimal |
CVE-2015-20107 |
LOW |
3.8.10-0ubuntu1~20.04.4 |
|
Expand...https://access.redhat.com/security/cve/CVE-2015-20107 https://bugs.python.org/issue24778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107 https://github.com/python/cpython/issues/68966 https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80 https://github.com/python/cpython/pull/91993 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/ https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/ https://nvd.nist.gov/vuln/detail/CVE-2015-20107 https://security.netapp.com/advisory/ntap-20220616-0001/
|
unzip |
CVE-2022-0529 |
MEDIUM |
6.0-25ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2022-0529 https://bugzilla.redhat.com/show_bug.cgi?id=2051395 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529 https://github.com/ByteHackr/unzip_poc https://nvd.nist.gov/vuln/detail/CVE-2022-0529
|
unzip |
CVE-2021-4217 |
LOW |
6.0-25ubuntu1 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-4217 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217
|
unzip |
CVE-2022-0530 |
LOW |
6.0-25ubuntu1 |
|
Expand...http://seclists.org/fulldisclosure/2022/May/33 http://seclists.org/fulldisclosure/2022/May/35 http://seclists.org/fulldisclosure/2022/May/38 https://access.redhat.com/security/cve/CVE-2022-0530 https://bugzilla.redhat.com/show_bug.cgi?id=2051395 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530 https://github.com/ByteHackr/unzip_poc https://nvd.nist.gov/vuln/detail/CVE-2022-0530 https://support.apple.com/kb/HT213255 https://support.apple.com/kb/HT213256 https://support.apple.com/kb/HT213257
|
wget |
CVE-2021-31879 |
MEDIUM |
1.20.3-1ubuntu2 |
|
Expand...https://access.redhat.com/security/cve/CVE-2021-31879 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879 https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html https://nvd.nist.gov/vuln/detail/CVE-2021-31879 https://savannah.gnu.org/bugs/?56909 https://security.netapp.com/advisory/ntap-20210618-0002/
|