apache2 |
CVE-2016-0736 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.14 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html http://www.debian.org/security/2017/dsa-3796 http://www.securityfocus.com/bid/95078 http://www.securitytracker.com/id/1037508 https://access.redhat.com/errata/RHSA-2017:0906 https://access.redhat.com/errata/RHSA-2017:1161 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/security/cve/CVE-2016-0736 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-0736 https://linux.oracle.com/cve/CVE-2016-0736.html https://linux.oracle.com/errata/ELSA-2017-0906.html https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201701-36 https://security.netapp.com/advisory/ntap-20180423-0001/ https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3279-1 https://www.exploit-db.com/exploits/40961/ https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt https://www.tenable.com/security/tns-2017-04
|
apache2 |
CVE-2016-5387 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.13 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html http://rhn.redhat.com/errata/RHSA-2016-1624.html http://rhn.redhat.com/errata/RHSA-2016-1625.html http://rhn.redhat.com/errata/RHSA-2016-1648.html http://rhn.redhat.com/errata/RHSA-2016-1649.html http://rhn.redhat.com/errata/RHSA-2016-1650.html http://www.debian.org/security/2016/dsa-3623 http://www.kb.cert.org/vuls/id/797896 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91816 http://www.securitytracker.com/id/1036330 http://www.ubuntu.com/usn/USN-3038-1 https://access.redhat.com/errata/RHSA-2016:1420 https://access.redhat.com/errata/RHSA-2016:1421 https://access.redhat.com/errata/RHSA-2016:1422 https://access.redhat.com/errata/RHSA-2016:1635 https://access.redhat.com/errata/RHSA-2016:1636 https://access.redhat.com/errata/RHSA-2016:1851 https://access.redhat.com/security/cve/CVE-2016-5387 https://access.redhat.com/security/vulnerabilities/httpoxy https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://httpoxy.org/ https://linux.oracle.com/cve/CVE-2016-5387.html https://linux.oracle.com/errata/ELSA-2016-1422.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6WCTE7443AYZ4EGELWLVNANA2WJCJIYI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEKZAB7MTWVSMORHTEMCQNFFMIHCYF76/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPQAPWQA774JPDRV4UIB2SZAX6D3UZCV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TGNHXJJSWDXAOEYH5TMXDPQVJMQQJOAZ/ https://security.gentoo.org/glsa/201701-36 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3038-1 https://www.apache.org/security/asf-httpoxy-response.txt https://www.tenable.com/security/tns-2017-04
|
apache2 |
CVE-2016-8743 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.14 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html http://www.debian.org/security/2017/dsa-3796 http://www.securityfocus.com/bid/95077 http://www.securitytracker.com/id/1037508 https://access.redhat.com/errata/RHSA-2017:0906 https://access.redhat.com/errata/RHSA-2017:1161 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1721 https://access.redhat.com/security/cve/CVE-2016-8743 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03753en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743 https://linux.oracle.com/cve/CVE-2016-8743.html https://linux.oracle.com/errata/ELSA-2017-1721.html https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201701-36 https://security.netapp.com/advisory/ntap-20180423-0001/ https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3279-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.tenable.com/security/tns-2017-04
|
apache2 |
CVE-2017-3167 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.16 |
Expand...http://www.debian.org/security/2017/dsa-3896 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99135 http://www.securitytracker.com/id/1038711 https://access.redhat.com/errata/RHSA-2017:2478 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3475 https://access.redhat.com/errata/RHSA-2017:3476 https://access.redhat.com/errata/RHSA-2017:3477 https://access.redhat.com/security/cve/CVE-2017-3167 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-3167.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8409e41a8f7dd9ded37141c38df001be930115428c3d64f70bbdb8b4@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3340-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.nomachine.com/SU08O00185 https://www.tenable.com/security/tns-2019-09
|
apache2 |
CVE-2017-3169 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.16 |
Expand...http://www.debian.org/security/2017/dsa-3896 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99134 http://www.securitytracker.com/id/1038711 https://access.redhat.com/errata/RHSA-2017:2478 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3475 https://access.redhat.com/errata/RHSA-2017:3476 https://access.redhat.com/errata/RHSA-2017:3477 https://access.redhat.com/security/cve/CVE-2017-3169 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169 https://github.com/gottburgm/Exploits/tree/master/CVE-2017-3169 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-3169.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84bf7fcc5cad35d355f11839cbdd13cbc5ffc1d34675090bff0f96ae@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3340-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.nomachine.com/SU08O00185 https://www.tenable.com/security/tns-2019-09
|
apache2 |
CVE-2017-7668 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.16 |
Expand...http://www.debian.org/security/2017/dsa-3896 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99137 http://www.securitytracker.com/id/1038711 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/security/cve/CVE-2017-7668 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-7668.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3340-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.tenable.com/security/tns-2019-09
|
apache2 |
CVE-2017-9788 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.17 |
Expand...http://www.debian.org/security/2017/dsa-3913 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99569 http://www.securitytracker.com/id/1038906 https://access.redhat.com/errata/RHSA-2017:2478 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:2708 https://access.redhat.com/errata/RHSA-2017:2709 https://access.redhat.com/errata/RHSA-2017:2710 https://access.redhat.com/errata/RHSA-2017:3113 https://access.redhat.com/errata/RHSA-2017:3114 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3239 https://access.redhat.com/errata/RHSA-2017:3240 https://access.redhat.com/security/cve/CVE-2017-9788 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27 https://linux.oracle.com/cve/CVE-2017-9788.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20170911-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3370-1 https://ubuntu.com/security/notices/USN-3370-2 https://www.tenable.com/security/tns-2019-09
|
apache2 |
CVE-2017-9798 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.18 |
Expand...http://openwall.com/lists/oss-security/2017/09/18/2 http://www.debian.org/security/2017/dsa-3980 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/100872 http://www.securityfocus.com/bid/105598 http://www.securitytracker.com/id/1039387 https://access.redhat.com/errata/RHSA-2017:2882 https://access.redhat.com/errata/RHSA-2017:2972 https://access.redhat.com/errata/RHSA-2017:3018 https://access.redhat.com/errata/RHSA-2017:3113 https://access.redhat.com/errata/RHSA-2017:3114 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3239 https://access.redhat.com/errata/RHSA-2017:3240 https://access.redhat.com/errata/RHSA-2017:3475 https://access.redhat.com/errata/RHSA-2017:3476 https://access.redhat.com/errata/RHSA-2017:3477 https://access.redhat.com/security/cve/CVE-2017-9798 https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798 https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a https://github.com/hannob/optionsbleed https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798 https://linux.oracle.com/cve/CVE-2017-9798.html https://linux.oracle.com/errata/ELSA-2017-2972.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2017-9798 https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0003/ https://support.apple.com/HT208331 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch https://ubuntu.com/security/notices/USN-3425-1 https://ubuntu.com/security/notices/USN-3425-2 https://www.exploit-db.com/exploits/42745/ https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.tenable.com/security/tns-2019-09
|
apache2 |
CVE-2019-0217 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.22 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html http://www.apache.org/dist/httpd/CHANGES_2.4 http://www.openwall.com/lists/oss-security/2019/04/02/5 http://www.securityfocus.com/bid/107668 https://access.redhat.com/errata/RHSA-2019:2343 https://access.redhat.com/errata/RHSA-2019:3436 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/errata/RHSA-2019:4126 https://access.redhat.com/security/cve/CVE-2019-0217 https://bugzilla.redhat.com/show_bug.cgi?id=1695020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0217 https://linux.oracle.com/cve/CVE-2019-0217.html https://linux.oracle.com/errata/ELSA-2019-3436.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/ https://seclists.org/bugtraq/2019/Apr/5 https://security.netapp.com/advisory/ntap-20190423-0001/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us https://ubuntu.com/security/notices/USN-3937-1 https://ubuntu.com/security/notices/USN-3937-2 https://usn.ubuntu.com/3937-1/ https://usn.ubuntu.com/3937-2/ https://www.debian.org/security/2019/dsa-4422 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
apache2 |
CVE-2016-2161 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.14 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html http://www.debian.org/security/2017/dsa-3796 http://www.securityfocus.com/bid/95076 http://www.securitytracker.com/id/1037508 https://access.redhat.com/errata/RHSA-2017:0906 https://access.redhat.com/errata/RHSA-2017:1161 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/security/cve/CVE-2016-2161 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161 https://linux.oracle.com/cve/CVE-2016-2161.html https://linux.oracle.com/errata/ELSA-2017-0906.html https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201701-36 https://security.netapp.com/advisory/ntap-20180423-0001/ https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3279-1 https://www.tenable.com/security/tns-2017-04
|
apache2 |
CVE-2016-4975 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.14 |
Expand...http://www.securityfocus.com/bid/105093 https://access.redhat.com/security/cve/CVE-2016-4975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975 https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975 https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://security.netapp.com/advisory/ntap-20180926-0006/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3279-1
|
apache2 |
CVE-2017-15710 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/8 http://www.securityfocus.com/bid/103512 http://www.securitytracker.com/id/1040569 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2017-15710 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-15710.html https://linux.oracle.com/errata/ELSA-2020-1121.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://ubuntu.com/security/notices/USN-3937-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://usn.ubuntu.com/3937-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2 |
CVE-2017-15715 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/6 http://www.securityfocus.com/bid/103525 http://www.securitytracker.com/id/1040570 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2017-15715 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-15715.html https://linux.oracle.com/errata/ELSA-2020-3958.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2 |
CVE-2017-7679 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.16 |
Expand...http://www.debian.org/security/2017/dsa-3896 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99170 http://www.securitytracker.com/id/1038711 https://access.redhat.com/errata/RHSA-2017:2478 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3475 https://access.redhat.com/errata/RHSA-2017:3476 https://access.redhat.com/errata/RHSA-2017:3477 https://access.redhat.com/security/cve/CVE-2017-7679 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679 https://github.com/gottburgm/Exploits/tree/master/CVE-2017-7679 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-7679.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f4515e580dfb6eeca589a5cdebd4c4c709ce632b12924f343c3b7751@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3340-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.nomachine.com/SU08O00185 https://www.tenable.com/security/tns-2019-09
|
apache2 |
CVE-2018-1283 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/4 http://www.securityfocus.com/bid/103520 http://www.securitytracker.com/id/1040568 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2018-1283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-1283.html https://linux.oracle.com/errata/ELSA-2020-3958.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2 |
CVE-2018-1301 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/2 http://www.securityfocus.com/bid/103515 http://www.securitytracker.com/id/1040573 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2018-1301 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-1301.html https://linux.oracle.com/errata/ELSA-2020-1121.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://ubuntu.com/security/notices/USN-3937-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://usn.ubuntu.com/3937-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2 |
CVE-2018-1303 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/3 http://www.securityfocus.com/bid/103522 http://www.securitytracker.com/id/1040572 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2018-1303 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-1303.html https://linux.oracle.com/errata/ELSA-2020-3958.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2 |
CVE-2018-1312 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/7 http://www.securityfocus.com/bid/103524 http://www.securitytracker.com/id/1040571 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/errata/RHSA-2019:1898 https://access.redhat.com/security/cve/CVE-2018-1312 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-1312.html https://linux.oracle.com/errata/ELSA-2019-1898.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://ubuntu.com/security/notices/USN-3937-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://usn.ubuntu.com/3937-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2 |
CVE-2018-17199 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/106742 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/errata/RHSA-2019:4126 https://access.redhat.com/security/cve/CVE-2018-17199 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-17199.html https://linux.oracle.com/errata/ELSA-2021-1809.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html https://seclists.org/bugtraq/2019/Apr/5 https://security.gentoo.org/glsa/201903-21 https://security.netapp.com/advisory/ntap-20190125-0001/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us https://ubuntu.com/security/notices/USN-3937-1 https://usn.ubuntu.com/3937-1/ https://www.debian.org/security/2019/dsa-4422 https://www.openwall.com/lists/oss-security/2019/01/22/3 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2019-09
|
apache2 |
CVE-2019-0220 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.22 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html http://www.apache.org/dist/httpd/CHANGES_2.4 http://www.openwall.com/lists/oss-security/2019/04/02/6 http://www.securityfocus.com/bid/107670 https://access.redhat.com/errata/RHSA-2019:2343 https://access.redhat.com/errata/RHSA-2019:3436 https://access.redhat.com/errata/RHSA-2019:4126 https://access.redhat.com/errata/RHSA-2020:0250 https://access.redhat.com/errata/RHSA-2020:0251 https://access.redhat.com/security/cve/CVE-2019-0220 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0220 https://linux.oracle.com/cve/CVE-2019-0220.html https://linux.oracle.com/errata/ELSA-2019-3436.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r31f46d1f16ffcafa68058596b21f6eaf6d352290e522690a1cdccdd7@%3Cbugs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/ https://seclists.org/bugtraq/2019/Apr/5 https://security.netapp.com/advisory/ntap-20190625-0007/ https://support.f5.com/csp/article/K44591505 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us https://ubuntu.com/security/notices/USN-3937-1 https://usn.ubuntu.com/3937-1/ https://www.debian.org/security/2019/dsa-4422 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
apache2-bin |
CVE-2016-0736 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.14 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html http://www.debian.org/security/2017/dsa-3796 http://www.securityfocus.com/bid/95078 http://www.securitytracker.com/id/1037508 https://access.redhat.com/errata/RHSA-2017:0906 https://access.redhat.com/errata/RHSA-2017:1161 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/security/cve/CVE-2016-0736 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-0736 https://linux.oracle.com/cve/CVE-2016-0736.html https://linux.oracle.com/errata/ELSA-2017-0906.html https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201701-36 https://security.netapp.com/advisory/ntap-20180423-0001/ https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3279-1 https://www.exploit-db.com/exploits/40961/ https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt https://www.tenable.com/security/tns-2017-04
|
apache2-bin |
CVE-2016-5387 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.13 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html http://rhn.redhat.com/errata/RHSA-2016-1624.html http://rhn.redhat.com/errata/RHSA-2016-1625.html http://rhn.redhat.com/errata/RHSA-2016-1648.html http://rhn.redhat.com/errata/RHSA-2016-1649.html http://rhn.redhat.com/errata/RHSA-2016-1650.html http://www.debian.org/security/2016/dsa-3623 http://www.kb.cert.org/vuls/id/797896 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91816 http://www.securitytracker.com/id/1036330 http://www.ubuntu.com/usn/USN-3038-1 https://access.redhat.com/errata/RHSA-2016:1420 https://access.redhat.com/errata/RHSA-2016:1421 https://access.redhat.com/errata/RHSA-2016:1422 https://access.redhat.com/errata/RHSA-2016:1635 https://access.redhat.com/errata/RHSA-2016:1636 https://access.redhat.com/errata/RHSA-2016:1851 https://access.redhat.com/security/cve/CVE-2016-5387 https://access.redhat.com/security/vulnerabilities/httpoxy https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://httpoxy.org/ https://linux.oracle.com/cve/CVE-2016-5387.html https://linux.oracle.com/errata/ELSA-2016-1422.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6WCTE7443AYZ4EGELWLVNANA2WJCJIYI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEKZAB7MTWVSMORHTEMCQNFFMIHCYF76/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPQAPWQA774JPDRV4UIB2SZAX6D3UZCV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TGNHXJJSWDXAOEYH5TMXDPQVJMQQJOAZ/ https://security.gentoo.org/glsa/201701-36 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3038-1 https://www.apache.org/security/asf-httpoxy-response.txt https://www.tenable.com/security/tns-2017-04
|
apache2-bin |
CVE-2016-8743 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.14 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html http://www.debian.org/security/2017/dsa-3796 http://www.securityfocus.com/bid/95077 http://www.securitytracker.com/id/1037508 https://access.redhat.com/errata/RHSA-2017:0906 https://access.redhat.com/errata/RHSA-2017:1161 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1721 https://access.redhat.com/security/cve/CVE-2016-8743 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03753en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743 https://linux.oracle.com/cve/CVE-2016-8743.html https://linux.oracle.com/errata/ELSA-2017-1721.html https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201701-36 https://security.netapp.com/advisory/ntap-20180423-0001/ https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3279-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.tenable.com/security/tns-2017-04
|
apache2-bin |
CVE-2017-3167 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.16 |
Expand...http://www.debian.org/security/2017/dsa-3896 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99135 http://www.securitytracker.com/id/1038711 https://access.redhat.com/errata/RHSA-2017:2478 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3475 https://access.redhat.com/errata/RHSA-2017:3476 https://access.redhat.com/errata/RHSA-2017:3477 https://access.redhat.com/security/cve/CVE-2017-3167 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-3167.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8409e41a8f7dd9ded37141c38df001be930115428c3d64f70bbdb8b4@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3340-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.nomachine.com/SU08O00185 https://www.tenable.com/security/tns-2019-09
|
apache2-bin |
CVE-2017-3169 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.16 |
Expand...http://www.debian.org/security/2017/dsa-3896 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99134 http://www.securitytracker.com/id/1038711 https://access.redhat.com/errata/RHSA-2017:2478 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3475 https://access.redhat.com/errata/RHSA-2017:3476 https://access.redhat.com/errata/RHSA-2017:3477 https://access.redhat.com/security/cve/CVE-2017-3169 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169 https://github.com/gottburgm/Exploits/tree/master/CVE-2017-3169 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-3169.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84bf7fcc5cad35d355f11839cbdd13cbc5ffc1d34675090bff0f96ae@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3340-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.nomachine.com/SU08O00185 https://www.tenable.com/security/tns-2019-09
|
apache2-bin |
CVE-2017-7668 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.16 |
Expand...http://www.debian.org/security/2017/dsa-3896 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99137 http://www.securitytracker.com/id/1038711 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/security/cve/CVE-2017-7668 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-7668.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3340-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.tenable.com/security/tns-2019-09
|
apache2-bin |
CVE-2017-9788 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.17 |
Expand...http://www.debian.org/security/2017/dsa-3913 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99569 http://www.securitytracker.com/id/1038906 https://access.redhat.com/errata/RHSA-2017:2478 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:2708 https://access.redhat.com/errata/RHSA-2017:2709 https://access.redhat.com/errata/RHSA-2017:2710 https://access.redhat.com/errata/RHSA-2017:3113 https://access.redhat.com/errata/RHSA-2017:3114 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3239 https://access.redhat.com/errata/RHSA-2017:3240 https://access.redhat.com/security/cve/CVE-2017-9788 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27 https://linux.oracle.com/cve/CVE-2017-9788.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20170911-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3370-1 https://ubuntu.com/security/notices/USN-3370-2 https://www.tenable.com/security/tns-2019-09
|
apache2-bin |
CVE-2017-9798 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.18 |
Expand...http://openwall.com/lists/oss-security/2017/09/18/2 http://www.debian.org/security/2017/dsa-3980 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/100872 http://www.securityfocus.com/bid/105598 http://www.securitytracker.com/id/1039387 https://access.redhat.com/errata/RHSA-2017:2882 https://access.redhat.com/errata/RHSA-2017:2972 https://access.redhat.com/errata/RHSA-2017:3018 https://access.redhat.com/errata/RHSA-2017:3113 https://access.redhat.com/errata/RHSA-2017:3114 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3239 https://access.redhat.com/errata/RHSA-2017:3240 https://access.redhat.com/errata/RHSA-2017:3475 https://access.redhat.com/errata/RHSA-2017:3476 https://access.redhat.com/errata/RHSA-2017:3477 https://access.redhat.com/security/cve/CVE-2017-9798 https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798 https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a https://github.com/hannob/optionsbleed https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798 https://linux.oracle.com/cve/CVE-2017-9798.html https://linux.oracle.com/errata/ELSA-2017-2972.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2017-9798 https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0003/ https://support.apple.com/HT208331 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch https://ubuntu.com/security/notices/USN-3425-1 https://ubuntu.com/security/notices/USN-3425-2 https://www.exploit-db.com/exploits/42745/ https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.tenable.com/security/tns-2019-09
|
apache2-bin |
CVE-2019-0217 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.22 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html http://www.apache.org/dist/httpd/CHANGES_2.4 http://www.openwall.com/lists/oss-security/2019/04/02/5 http://www.securityfocus.com/bid/107668 https://access.redhat.com/errata/RHSA-2019:2343 https://access.redhat.com/errata/RHSA-2019:3436 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/errata/RHSA-2019:4126 https://access.redhat.com/security/cve/CVE-2019-0217 https://bugzilla.redhat.com/show_bug.cgi?id=1695020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0217 https://linux.oracle.com/cve/CVE-2019-0217.html https://linux.oracle.com/errata/ELSA-2019-3436.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/ https://seclists.org/bugtraq/2019/Apr/5 https://security.netapp.com/advisory/ntap-20190423-0001/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us https://ubuntu.com/security/notices/USN-3937-1 https://ubuntu.com/security/notices/USN-3937-2 https://usn.ubuntu.com/3937-1/ https://usn.ubuntu.com/3937-2/ https://www.debian.org/security/2019/dsa-4422 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
apache2-bin |
CVE-2016-2161 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.14 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html http://www.debian.org/security/2017/dsa-3796 http://www.securityfocus.com/bid/95076 http://www.securitytracker.com/id/1037508 https://access.redhat.com/errata/RHSA-2017:0906 https://access.redhat.com/errata/RHSA-2017:1161 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/security/cve/CVE-2016-2161 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161 https://linux.oracle.com/cve/CVE-2016-2161.html https://linux.oracle.com/errata/ELSA-2017-0906.html https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201701-36 https://security.netapp.com/advisory/ntap-20180423-0001/ https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3279-1 https://www.tenable.com/security/tns-2017-04
|
apache2-bin |
CVE-2016-4975 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.14 |
Expand...http://www.securityfocus.com/bid/105093 https://access.redhat.com/security/cve/CVE-2016-4975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975 https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975 https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://security.netapp.com/advisory/ntap-20180926-0006/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3279-1
|
apache2-bin |
CVE-2017-15710 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/8 http://www.securityfocus.com/bid/103512 http://www.securitytracker.com/id/1040569 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2017-15710 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-15710.html https://linux.oracle.com/errata/ELSA-2020-1121.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://ubuntu.com/security/notices/USN-3937-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://usn.ubuntu.com/3937-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2-bin |
CVE-2017-15715 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/6 http://www.securityfocus.com/bid/103525 http://www.securitytracker.com/id/1040570 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2017-15715 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-15715.html https://linux.oracle.com/errata/ELSA-2020-3958.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2-bin |
CVE-2017-7679 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.16 |
Expand...http://www.debian.org/security/2017/dsa-3896 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99170 http://www.securitytracker.com/id/1038711 https://access.redhat.com/errata/RHSA-2017:2478 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3475 https://access.redhat.com/errata/RHSA-2017:3476 https://access.redhat.com/errata/RHSA-2017:3477 https://access.redhat.com/security/cve/CVE-2017-7679 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679 https://github.com/gottburgm/Exploits/tree/master/CVE-2017-7679 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-7679.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f4515e580dfb6eeca589a5cdebd4c4c709ce632b12924f343c3b7751@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3340-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.nomachine.com/SU08O00185 https://www.tenable.com/security/tns-2019-09
|
apache2-bin |
CVE-2018-1283 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/4 http://www.securityfocus.com/bid/103520 http://www.securitytracker.com/id/1040568 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2018-1283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-1283.html https://linux.oracle.com/errata/ELSA-2020-3958.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2-bin |
CVE-2018-1301 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/2 http://www.securityfocus.com/bid/103515 http://www.securitytracker.com/id/1040573 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2018-1301 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-1301.html https://linux.oracle.com/errata/ELSA-2020-1121.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://ubuntu.com/security/notices/USN-3937-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://usn.ubuntu.com/3937-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2-bin |
CVE-2018-1303 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/3 http://www.securityfocus.com/bid/103522 http://www.securitytracker.com/id/1040572 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2018-1303 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-1303.html https://linux.oracle.com/errata/ELSA-2020-3958.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2-bin |
CVE-2018-1312 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/7 http://www.securityfocus.com/bid/103524 http://www.securitytracker.com/id/1040571 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/errata/RHSA-2019:1898 https://access.redhat.com/security/cve/CVE-2018-1312 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-1312.html https://linux.oracle.com/errata/ELSA-2019-1898.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://ubuntu.com/security/notices/USN-3937-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://usn.ubuntu.com/3937-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2-bin |
CVE-2018-17199 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/106742 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/errata/RHSA-2019:4126 https://access.redhat.com/security/cve/CVE-2018-17199 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-17199.html https://linux.oracle.com/errata/ELSA-2021-1809.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html https://seclists.org/bugtraq/2019/Apr/5 https://security.gentoo.org/glsa/201903-21 https://security.netapp.com/advisory/ntap-20190125-0001/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us https://ubuntu.com/security/notices/USN-3937-1 https://usn.ubuntu.com/3937-1/ https://www.debian.org/security/2019/dsa-4422 https://www.openwall.com/lists/oss-security/2019/01/22/3 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2019-09
|
apache2-bin |
CVE-2019-0220 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.22 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html http://www.apache.org/dist/httpd/CHANGES_2.4 http://www.openwall.com/lists/oss-security/2019/04/02/6 http://www.securityfocus.com/bid/107670 https://access.redhat.com/errata/RHSA-2019:2343 https://access.redhat.com/errata/RHSA-2019:3436 https://access.redhat.com/errata/RHSA-2019:4126 https://access.redhat.com/errata/RHSA-2020:0250 https://access.redhat.com/errata/RHSA-2020:0251 https://access.redhat.com/security/cve/CVE-2019-0220 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0220 https://linux.oracle.com/cve/CVE-2019-0220.html https://linux.oracle.com/errata/ELSA-2019-3436.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r31f46d1f16ffcafa68058596b21f6eaf6d352290e522690a1cdccdd7@%3Cbugs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/ https://seclists.org/bugtraq/2019/Apr/5 https://security.netapp.com/advisory/ntap-20190625-0007/ https://support.f5.com/csp/article/K44591505 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us https://ubuntu.com/security/notices/USN-3937-1 https://usn.ubuntu.com/3937-1/ https://www.debian.org/security/2019/dsa-4422 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
apache2-data |
CVE-2016-0736 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.14 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html http://www.debian.org/security/2017/dsa-3796 http://www.securityfocus.com/bid/95078 http://www.securitytracker.com/id/1037508 https://access.redhat.com/errata/RHSA-2017:0906 https://access.redhat.com/errata/RHSA-2017:1161 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/security/cve/CVE-2016-0736 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-0736 https://linux.oracle.com/cve/CVE-2016-0736.html https://linux.oracle.com/errata/ELSA-2017-0906.html https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201701-36 https://security.netapp.com/advisory/ntap-20180423-0001/ https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3279-1 https://www.exploit-db.com/exploits/40961/ https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt https://www.tenable.com/security/tns-2017-04
|
apache2-data |
CVE-2016-5387 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.13 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html http://rhn.redhat.com/errata/RHSA-2016-1624.html http://rhn.redhat.com/errata/RHSA-2016-1625.html http://rhn.redhat.com/errata/RHSA-2016-1648.html http://rhn.redhat.com/errata/RHSA-2016-1649.html http://rhn.redhat.com/errata/RHSA-2016-1650.html http://www.debian.org/security/2016/dsa-3623 http://www.kb.cert.org/vuls/id/797896 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91816 http://www.securitytracker.com/id/1036330 http://www.ubuntu.com/usn/USN-3038-1 https://access.redhat.com/errata/RHSA-2016:1420 https://access.redhat.com/errata/RHSA-2016:1421 https://access.redhat.com/errata/RHSA-2016:1422 https://access.redhat.com/errata/RHSA-2016:1635 https://access.redhat.com/errata/RHSA-2016:1636 https://access.redhat.com/errata/RHSA-2016:1851 https://access.redhat.com/security/cve/CVE-2016-5387 https://access.redhat.com/security/vulnerabilities/httpoxy https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://httpoxy.org/ https://linux.oracle.com/cve/CVE-2016-5387.html https://linux.oracle.com/errata/ELSA-2016-1422.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6WCTE7443AYZ4EGELWLVNANA2WJCJIYI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEKZAB7MTWVSMORHTEMCQNFFMIHCYF76/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPQAPWQA774JPDRV4UIB2SZAX6D3UZCV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TGNHXJJSWDXAOEYH5TMXDPQVJMQQJOAZ/ https://security.gentoo.org/glsa/201701-36 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3038-1 https://www.apache.org/security/asf-httpoxy-response.txt https://www.tenable.com/security/tns-2017-04
|
apache2-data |
CVE-2016-8743 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.14 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html http://www.debian.org/security/2017/dsa-3796 http://www.securityfocus.com/bid/95077 http://www.securitytracker.com/id/1037508 https://access.redhat.com/errata/RHSA-2017:0906 https://access.redhat.com/errata/RHSA-2017:1161 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1721 https://access.redhat.com/security/cve/CVE-2016-8743 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03753en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743 https://linux.oracle.com/cve/CVE-2016-8743.html https://linux.oracle.com/errata/ELSA-2017-1721.html https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201701-36 https://security.netapp.com/advisory/ntap-20180423-0001/ https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3279-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.tenable.com/security/tns-2017-04
|
apache2-data |
CVE-2017-3167 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.16 |
Expand...http://www.debian.org/security/2017/dsa-3896 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99135 http://www.securitytracker.com/id/1038711 https://access.redhat.com/errata/RHSA-2017:2478 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3475 https://access.redhat.com/errata/RHSA-2017:3476 https://access.redhat.com/errata/RHSA-2017:3477 https://access.redhat.com/security/cve/CVE-2017-3167 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-3167.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8409e41a8f7dd9ded37141c38df001be930115428c3d64f70bbdb8b4@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3340-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.nomachine.com/SU08O00185 https://www.tenable.com/security/tns-2019-09
|
apache2-data |
CVE-2017-3169 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.16 |
Expand...http://www.debian.org/security/2017/dsa-3896 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99134 http://www.securitytracker.com/id/1038711 https://access.redhat.com/errata/RHSA-2017:2478 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3475 https://access.redhat.com/errata/RHSA-2017:3476 https://access.redhat.com/errata/RHSA-2017:3477 https://access.redhat.com/security/cve/CVE-2017-3169 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169 https://github.com/gottburgm/Exploits/tree/master/CVE-2017-3169 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-3169.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84bf7fcc5cad35d355f11839cbdd13cbc5ffc1d34675090bff0f96ae@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3340-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.nomachine.com/SU08O00185 https://www.tenable.com/security/tns-2019-09
|
apache2-data |
CVE-2017-7668 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.16 |
Expand...http://www.debian.org/security/2017/dsa-3896 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99137 http://www.securitytracker.com/id/1038711 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/security/cve/CVE-2017-7668 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-7668.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3340-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.tenable.com/security/tns-2019-09
|
apache2-data |
CVE-2017-9788 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.17 |
Expand...http://www.debian.org/security/2017/dsa-3913 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99569 http://www.securitytracker.com/id/1038906 https://access.redhat.com/errata/RHSA-2017:2478 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:2708 https://access.redhat.com/errata/RHSA-2017:2709 https://access.redhat.com/errata/RHSA-2017:2710 https://access.redhat.com/errata/RHSA-2017:3113 https://access.redhat.com/errata/RHSA-2017:3114 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3239 https://access.redhat.com/errata/RHSA-2017:3240 https://access.redhat.com/security/cve/CVE-2017-9788 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27 https://linux.oracle.com/cve/CVE-2017-9788.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20170911-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3370-1 https://ubuntu.com/security/notices/USN-3370-2 https://www.tenable.com/security/tns-2019-09
|
apache2-data |
CVE-2017-9798 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.18 |
Expand...http://openwall.com/lists/oss-security/2017/09/18/2 http://www.debian.org/security/2017/dsa-3980 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/100872 http://www.securityfocus.com/bid/105598 http://www.securitytracker.com/id/1039387 https://access.redhat.com/errata/RHSA-2017:2882 https://access.redhat.com/errata/RHSA-2017:2972 https://access.redhat.com/errata/RHSA-2017:3018 https://access.redhat.com/errata/RHSA-2017:3113 https://access.redhat.com/errata/RHSA-2017:3114 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3239 https://access.redhat.com/errata/RHSA-2017:3240 https://access.redhat.com/errata/RHSA-2017:3475 https://access.redhat.com/errata/RHSA-2017:3476 https://access.redhat.com/errata/RHSA-2017:3477 https://access.redhat.com/security/cve/CVE-2017-9798 https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798 https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a https://github.com/hannob/optionsbleed https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798 https://linux.oracle.com/cve/CVE-2017-9798.html https://linux.oracle.com/errata/ELSA-2017-2972.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security-tracker.debian.org/tracker/CVE-2017-9798 https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0003/ https://support.apple.com/HT208331 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch https://ubuntu.com/security/notices/USN-3425-1 https://ubuntu.com/security/notices/USN-3425-2 https://www.exploit-db.com/exploits/42745/ https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.tenable.com/security/tns-2019-09
|
apache2-data |
CVE-2019-0217 |
MEDIUM |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.22 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html http://www.apache.org/dist/httpd/CHANGES_2.4 http://www.openwall.com/lists/oss-security/2019/04/02/5 http://www.securityfocus.com/bid/107668 https://access.redhat.com/errata/RHSA-2019:2343 https://access.redhat.com/errata/RHSA-2019:3436 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/errata/RHSA-2019:4126 https://access.redhat.com/security/cve/CVE-2019-0217 https://bugzilla.redhat.com/show_bug.cgi?id=1695020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0217 https://linux.oracle.com/cve/CVE-2019-0217.html https://linux.oracle.com/errata/ELSA-2019-3436.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/ https://seclists.org/bugtraq/2019/Apr/5 https://security.netapp.com/advisory/ntap-20190423-0001/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us https://ubuntu.com/security/notices/USN-3937-1 https://ubuntu.com/security/notices/USN-3937-2 https://usn.ubuntu.com/3937-1/ https://usn.ubuntu.com/3937-2/ https://www.debian.org/security/2019/dsa-4422 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
apache2-data |
CVE-2016-2161 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.14 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html http://www.debian.org/security/2017/dsa-3796 http://www.securityfocus.com/bid/95076 http://www.securitytracker.com/id/1037508 https://access.redhat.com/errata/RHSA-2017:0906 https://access.redhat.com/errata/RHSA-2017:1161 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/security/cve/CVE-2016-2161 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161 https://linux.oracle.com/cve/CVE-2016-2161.html https://linux.oracle.com/errata/ELSA-2017-0906.html https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201701-36 https://security.netapp.com/advisory/ntap-20180423-0001/ https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3279-1 https://www.tenable.com/security/tns-2017-04
|
apache2-data |
CVE-2016-4975 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.14 |
Expand...http://www.securityfocus.com/bid/105093 https://access.redhat.com/security/cve/CVE-2016-4975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975 https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975 https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://security.netapp.com/advisory/ntap-20180926-0006/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3279-1
|
apache2-data |
CVE-2017-15710 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/8 http://www.securityfocus.com/bid/103512 http://www.securitytracker.com/id/1040569 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2017-15710 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-15710.html https://linux.oracle.com/errata/ELSA-2020-1121.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://ubuntu.com/security/notices/USN-3937-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://usn.ubuntu.com/3937-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2-data |
CVE-2017-15715 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/6 http://www.securityfocus.com/bid/103525 http://www.securitytracker.com/id/1040570 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2017-15715 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-15715.html https://linux.oracle.com/errata/ELSA-2020-3958.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2-data |
CVE-2017-7679 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.16 |
Expand...http://www.debian.org/security/2017/dsa-3896 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/99170 http://www.securitytracker.com/id/1038711 https://access.redhat.com/errata/RHSA-2017:2478 https://access.redhat.com/errata/RHSA-2017:2479 https://access.redhat.com/errata/RHSA-2017:2483 https://access.redhat.com/errata/RHSA-2017:3193 https://access.redhat.com/errata/RHSA-2017:3194 https://access.redhat.com/errata/RHSA-2017:3195 https://access.redhat.com/errata/RHSA-2017:3475 https://access.redhat.com/errata/RHSA-2017:3476 https://access.redhat.com/errata/RHSA-2017:3477 https://access.redhat.com/security/cve/CVE-2017-7679 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679 https://github.com/gottburgm/Exploits/tree/master/CVE-2017-7679 https://httpd.apache.org/security/vulnerabilities_22.html https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2017-7679.html https://linux.oracle.com/errata/ELSA-2017-2479.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/f4515e580dfb6eeca589a5cdebd4c4c709ce632b12924f343c3b7751@%3Cdev.httpd.apache.org%3E https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.gentoo.org/glsa/201710-32 https://security.netapp.com/advisory/ntap-20180601-0002/ https://support.apple.com/HT208221 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us https://ubuntu.com/security/notices/USN-3340-1 https://ubuntu.com/security/notices/USN-3373-1 https://www.nomachine.com/SU08O00185 https://www.tenable.com/security/tns-2019-09
|
apache2-data |
CVE-2018-1283 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/4 http://www.securityfocus.com/bid/103520 http://www.securitytracker.com/id/1040568 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2018-1283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-1283.html https://linux.oracle.com/errata/ELSA-2020-3958.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2-data |
CVE-2018-1301 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/2 http://www.securityfocus.com/bid/103515 http://www.securitytracker.com/id/1040573 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2018-1301 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-1301.html https://linux.oracle.com/errata/ELSA-2020-1121.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://ubuntu.com/security/notices/USN-3937-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://usn.ubuntu.com/3937-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2-data |
CVE-2018-1303 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/3 http://www.securityfocus.com/bid/103522 http://www.securitytracker.com/id/1040572 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/security/cve/CVE-2018-1303 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-1303.html https://linux.oracle.com/errata/ELSA-2020-3958.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2-data |
CVE-2018-1312 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.20 |
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/7 http://www.securityfocus.com/bid/103524 http://www.securitytracker.com/id/1040571 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/errata/RHSA-2019:1898 https://access.redhat.com/security/cve/CVE-2018-1312 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-1312.html https://linux.oracle.com/errata/ELSA-2019-1898.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html https://security.netapp.com/advisory/ntap-20180601-0004/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us https://ubuntu.com/security/notices/USN-3627-1 https://ubuntu.com/security/notices/USN-3627-2 https://ubuntu.com/security/notices/USN-3937-2 https://usn.ubuntu.com/3627-1/ https://usn.ubuntu.com/3627-2/ https://usn.ubuntu.com/3937-2/ https://www.debian.org/security/2018/dsa-4164 https://www.tenable.com/security/tns-2019-09
|
apache2-data |
CVE-2018-17199 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/106742 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/errata/RHSA-2019:4126 https://access.redhat.com/security/cve/CVE-2018-17199 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199 https://httpd.apache.org/security/vulnerabilities_24.html https://linux.oracle.com/cve/CVE-2018-17199.html https://linux.oracle.com/errata/ELSA-2021-1809.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html https://seclists.org/bugtraq/2019/Apr/5 https://security.gentoo.org/glsa/201903-21 https://security.netapp.com/advisory/ntap-20190125-0001/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us https://ubuntu.com/security/notices/USN-3937-1 https://usn.ubuntu.com/3937-1/ https://www.debian.org/security/2019/dsa-4422 https://www.openwall.com/lists/oss-security/2019/01/22/3 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2019-09
|
apache2-data |
CVE-2019-0220 |
LOW |
2.4.7-1ubuntu4.9 |
2.4.7-1ubuntu4.22 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html http://www.apache.org/dist/httpd/CHANGES_2.4 http://www.openwall.com/lists/oss-security/2019/04/02/6 http://www.securityfocus.com/bid/107670 https://access.redhat.com/errata/RHSA-2019:2343 https://access.redhat.com/errata/RHSA-2019:3436 https://access.redhat.com/errata/RHSA-2019:4126 https://access.redhat.com/errata/RHSA-2020:0250 https://access.redhat.com/errata/RHSA-2020:0251 https://access.redhat.com/security/cve/CVE-2019-0220 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220 https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0220 https://linux.oracle.com/cve/CVE-2019-0220.html https://linux.oracle.com/errata/ELSA-2019-3436.html https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r31f46d1f16ffcafa68058596b21f6eaf6d352290e522690a1cdccdd7@%3Cbugs.httpd.apache.org%3E https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/ https://seclists.org/bugtraq/2019/Apr/5 https://security.netapp.com/advisory/ntap-20190625-0007/ https://support.f5.com/csp/article/K44591505 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us https://ubuntu.com/security/notices/USN-3937-1 https://usn.ubuntu.com/3937-1/ https://www.debian.org/security/2019/dsa-4422 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
apt |
CVE-2016-1252 |
HIGH |
1.0.1ubuntu2.10 |
1.0.1ubuntu2.17 |
Expand...http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html http://www.ubuntu.com/usn/USN-3156-1 https://bugs.chromium.org/p/project-zero/issues/detail?id=1020 https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1252 https://ubuntu.com/security/notices/USN-3156-1 https://www.debian.org/security/2016/dsa-3733 https://www.exploit-db.com/exploits/40916/
|
apt |
CVE-2019-3462 |
HIGH |
1.0.1ubuntu2.10 |
1.0.1ubuntu2.19 |
Expand...http://www.securityfocus.com/bid/106690 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3462 https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html https://security.netapp.com/advisory/ntap-20190125-0002/ https://ubuntu.com/security/notices/USN-3863-1 https://ubuntu.com/security/notices/USN-3863-2 https://usn.ubuntu.com/3863-1/ https://usn.ubuntu.com/3863-2/ https://www.debian.org/security/2019/dsa-4371
|
apt-utils |
CVE-2016-1252 |
HIGH |
1.0.1ubuntu2.10 |
1.0.1ubuntu2.17 |
Expand...http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html http://www.ubuntu.com/usn/USN-3156-1 https://bugs.chromium.org/p/project-zero/issues/detail?id=1020 https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1252 https://ubuntu.com/security/notices/USN-3156-1 https://www.debian.org/security/2016/dsa-3733 https://www.exploit-db.com/exploits/40916/
|
apt-utils |
CVE-2019-3462 |
HIGH |
1.0.1ubuntu2.10 |
1.0.1ubuntu2.19 |
Expand...http://www.securityfocus.com/bid/106690 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3462 https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html https://security.netapp.com/advisory/ntap-20190125-0002/ https://ubuntu.com/security/notices/USN-3863-1 https://ubuntu.com/security/notices/USN-3863-2 https://usn.ubuntu.com/3863-1/ https://usn.ubuntu.com/3863-2/ https://www.debian.org/security/2019/dsa-4371
|
bash |
CVE-2016-7543 |
MEDIUM |
4.3-7ubuntu1.5 |
4.3-7ubuntu1.7 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-0725.html http://www.openwall.com/lists/oss-security/2016/09/26/9 http://www.securityfocus.com/bid/93183 http://www.securitytracker.com/id/1037812 https://access.redhat.com/errata/RHSA-2017:1931 https://access.redhat.com/security/cve/CVE-2016-7543 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05388115 https://linux.oracle.com/cve/CVE-2016-7543.html https://linux.oracle.com/errata/ELSA-2017-1931.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7XOQSHU63Y357NHU5FPTFBM6I3YOCQB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OU3C756YPHDAAPFX76UGZBAQQQ5UMHS5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2VRBSIPZDZ75ZQ2DLITHUIDW4W26KVR/ https://lists.gnu.org/archive/html/bug-bash/2016-09/msg00018.html https://security.gentoo.org/glsa/201701-02 https://ubuntu.com/security/notices/USN-3294-1 https://ubuntu.com/security/notices/USN-3294-2
|
bash |
CVE-2016-0634 |
LOW |
4.3-7ubuntu1.5 |
4.3-7ubuntu1.7 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-0725.html http://www.openwall.com/lists/oss-security/2016/09/16/12 http://www.openwall.com/lists/oss-security/2016/09/16/8 http://www.openwall.com/lists/oss-security/2016/09/18/11 http://www.openwall.com/lists/oss-security/2016/09/19/7 http://www.openwall.com/lists/oss-security/2016/09/20/1 http://www.openwall.com/lists/oss-security/2016/09/27/9 http://www.openwall.com/lists/oss-security/2016/09/29/27 http://www.openwall.com/lists/oss-security/2016/10/07/6 http://www.openwall.com/lists/oss-security/2016/10/10/3 http://www.openwall.com/lists/oss-security/2016/10/10/4 http://www.securityfocus.com/bid/92999 https://access.redhat.com/errata/RHSA-2017:1931 https://access.redhat.com/security/cve/CVE-2016-0634 https://bugzilla.redhat.com/show_bug.cgi?id=1377613 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634 https://linux.oracle.com/cve/CVE-2016-0634.html https://linux.oracle.com/errata/ELSA-2017-1931.html https://security.gentoo.org/glsa/201612-39 https://ubuntu.com/security/notices/USN-3294-1
|
bash |
CVE-2016-9401 |
LOW |
4.3-7ubuntu1.5 |
4.3-7ubuntu1.7 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-0725.html http://www.openwall.com/lists/oss-security/2016/11/17/5 http://www.openwall.com/lists/oss-security/2016/11/17/9 http://www.securityfocus.com/bid/94398 https://access.redhat.com/errata/RHSA-2017:1931 https://access.redhat.com/security/cve/CVE-2016-9401 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401 https://linux.oracle.com/cve/CVE-2016-9401.html https://linux.oracle.com/errata/ELSA-2017-1931.html https://lists.debian.org/debian-lts-announce/2019/03/msg00028.html https://security.gentoo.org/glsa/201701-02 https://ubuntu.com/security/notices/USN-3294-1
|
busybox-initramfs |
CVE-2015-9261 |
MEDIUM |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
Expand...http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://seclists.org/fulldisclosure/2019/Jun/18 http://seclists.org/fulldisclosure/2019/Sep/7 http://seclists.org/fulldisclosure/2020/Aug/20 http://www.openwall.com/lists/oss-security/2015/10/25/3 https://access.redhat.com/security/cve/CVE-2015-9261 https://bugs.debian.org/803097 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9261 https://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html https://seclists.org/bugtraq/2019/Jun/14 https://seclists.org/bugtraq/2019/Sep/7 https://ubuntu.com/security/notices/USN-3935-1 https://usn.ubuntu.com/3935-1/
|
busybox-initramfs |
CVE-2017-16544 |
MEDIUM |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html http://seclists.org/fulldisclosure/2019/Jun/18 http://seclists.org/fulldisclosure/2019/Sep/7 http://seclists.org/fulldisclosure/2020/Aug/20 http://seclists.org/fulldisclosure/2020/Mar/15 http://seclists.org/fulldisclosure/2020/Sep/6 http://seclists.org/fulldisclosure/2021/Aug/21 http://seclists.org/fulldisclosure/2021/Jan/39 http://www.vmware.com/security/advisories/VMSA-2019-0013.html https://access.redhat.com/security/cve/CVE-2017-16544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16544 https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8 https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html https://seclists.org/bugtraq/2019/Jun/14 https://seclists.org/bugtraq/2019/Sep/7 https://ubuntu.com/security/notices/USN-3935-1 https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01 https://usn.ubuntu.com/3935-1/ https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/
|
busybox-initramfs |
CVE-2018-1000517 |
MEDIUM |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
Expand...https://access.redhat.com/security/cve/CVE-2018-1000517 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000517 https://git.busybox.net/busybox/commit/?id=8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html https://ubuntu.com/security/notices/USN-3935-1 https://usn.ubuntu.com/3935-1/
|
busybox-initramfs |
CVE-2019-5747 |
MEDIUM |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://seclists.org/fulldisclosure/2019/Sep/7 https://access.redhat.com/security/cve/CVE-2019-5747 https://bugs.busybox.net/show_bug.cgi?id=11506 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5747 https://git.busybox.net/busybox/commit/?id=74d9f1ba37010face4bd1449df4d60dd84450b06 https://seclists.org/bugtraq/2019/Sep/7 https://ubuntu.com/security/notices/USN-3935-1 https://usn.ubuntu.com/3935-1/
|
busybox-initramfs |
CVE-2011-5325 |
LOW |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
Expand...http://openwall.com/lists/oss-security/2015/10/21/4 http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html http://seclists.org/fulldisclosure/2019/Jun/18 http://seclists.org/fulldisclosure/2020/Aug/20 http://www.openwall.com/lists/oss-security/2015/10/21/7 https://access.redhat.com/security/cve/CVE-2011-5325 https://bugzilla.redhat.com/show_bug.cgi?id=1274215 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5325 https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html https://seclists.org/bugtraq/2019/Jun/14 https://ubuntu.com/security/notices/USN-3935-1 https://usn.ubuntu.com/3935-1/
|
busybox-initramfs |
CVE-2014-9645 |
LOW |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
Expand...http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b http://openwall.com/lists/oss-security/2015/01/24/4 http://seclists.org/fulldisclosure/2020/Mar/15 http://www.securityfocus.com/bid/72324 https://access.redhat.com/security/cve/CVE-2014-9645 https://bugs.busybox.net/show_bug.cgi?id=7652 https://bugzilla.redhat.com/show_bug.cgi?id=1185707 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9645 https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu https://security.gentoo.org/glsa/201503-13 https://ubuntu.com/security/notices/USN-3935-1 https://usn.ubuntu.com/3935-1/
|
busybox-initramfs |
CVE-2016-2147 |
LOW |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
Expand...http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://seclists.org/fulldisclosure/2019/Jun/18 http://seclists.org/fulldisclosure/2019/Sep/7 http://seclists.org/fulldisclosure/2020/Aug/20 http://www.openwall.com/lists/oss-security/2016/03/11/16 https://access.redhat.com/security/cve/CVE-2016-2147 https://busybox.net/news.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2147 https://git.busybox.net/busybox/commit/?id=d474ffc68290e0a83651c4432eeabfa62cd51e87 https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html https://seclists.org/bugtraq/2019/Jun/14 https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201612-04 https://ubuntu.com/security/notices/USN-3935-1 https://usn.ubuntu.com/3935-1/
|
busybox-initramfs |
CVE-2016-2148 |
LOW |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
Expand...http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://seclists.org/fulldisclosure/2019/Jun/18 http://seclists.org/fulldisclosure/2019/Sep/7 http://seclists.org/fulldisclosure/2020/Aug/20 http://www.openwall.com/lists/oss-security/2016/03/11/16 https://access.redhat.com/security/cve/CVE-2016-2148 https://busybox.net/news.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2148 https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html https://seclists.org/bugtraq/2019/Jun/14 https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201612-04 https://ubuntu.com/security/notices/USN-3935-1 https://usn.ubuntu.com/3935-1/
|
busybox-initramfs |
CVE-2017-15873 |
LOW |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
Expand...https://access.redhat.com/security/cve/CVE-2017-15873 https://bugs.busybox.net/show_bug.cgi?id=10431 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15873 https://git.busybox.net/busybox/commit/?id=0402cb32df015d9372578e3db27db47b33d5c7b0 https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html https://ubuntu.com/security/notices/USN-3935-1 https://usn.ubuntu.com/3935-1/
|
busybox-initramfs |
CVE-2018-20679 |
LOW |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://seclists.org/fulldisclosure/2019/Sep/7 https://access.redhat.com/security/cve/CVE-2018-20679 https://bugs.busybox.net/show_bug.cgi?id=11506 https://busybox.net/news.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20679 https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c https://seclists.org/bugtraq/2019/Sep/7 https://ubuntu.com/security/notices/USN-3935-1 https://usn.ubuntu.com/3935-1/
|
cpio |
CVE-2016-2037 |
MEDIUM |
2.11+dfsg-1ubuntu1.1 |
2.11+dfsg-1ubuntu1.2 |
Expand...http://www.debian.org/security/2016/dsa-3483 http://www.openwall.com/lists/oss-security/2016/01/19/4 http://www.openwall.com/lists/oss-security/2016/01/22/4 http://www.securityfocus.com/bid/82293 http://www.securitytracker.com/id/1035067 http://www.ubuntu.com/usn/USN-2906-1 https://access.redhat.com/security/cve/CVE-2016-2037 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037 https://ubuntu.com/security/notices/USN-2906-1
|
cpio |
CVE-2015-1197 |
LOW |
2.11+dfsg-1ubuntu1.1 |
2.11+dfsg-1ubuntu1.2 |
Expand...http://advisories.mageia.org/MGASA-2015-0080.html http://www.mandriva.com/security/advisories?name=MDVSA-2015:066 http://www.openwall.com/lists/oss-security/2015/01/07/5 http://www.openwall.com/lists/oss-security/2015/01/18/7 http://www.securityfocus.com/bid/71914 http://www.ubuntu.com/usn/USN-2906-1 https://access.redhat.com/security/cve/CVE-2015-1197 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1197 https://lists.gnu.org/archive/html/bug-cpio/2015-01/msg00000.html https://ubuntu.com/security/notices/USN-2906-1
|
eject |
CVE-2017-6964 |
MEDIUM |
2.1.5+deb1+cvs20081104-13.1 |
2.1.5+deb1+cvs20081104-13.1ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3823 http://www.securityfocus.com/bid/97154 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6964 https://launchpad.net/bugs/1673627 https://ubuntu.com/security/notices/USN-3246-1 https://www.debian.org/security/2017/dsa-3823 https://www.ubuntu.com/usn/usn-3246-1/
|
file |
CVE-2014-9620 |
LOW |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
Expand...http://advisories.mageia.org/MGASA-2015-0040.html http://mx.gw.com/pipermail/file/2014/001653.html http://mx.gw.com/pipermail/file/2015/001660.html http://rhn.redhat.com/errata/RHSA-2016-0760.html http://www.debian.org/security/2015/dsa-3121 http://www.openwall.com/lists/oss-security/2015/01/17/9 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/71715 https://access.redhat.com/security/cve/CVE-2014-9620 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620 https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4 https://linux.oracle.com/cve/CVE-2014-9620.html https://linux.oracle.com/errata/ELSA-2016-0760.html https://security.gentoo.org/glsa/201503-08 https://ubuntu.com/security/notices/USN-3686-1 https://usn.ubuntu.com/3686-1/
|
file |
CVE-2014-9621 |
LOW |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
Expand...http://advisories.mageia.org/MGASA-2015-0040.html http://mx.gw.com/pipermail/file/2014/001654.html http://mx.gw.com/pipermail/file/2015/001660.html http://www.openwall.com/lists/oss-security/2015/01/17/9 https://access.redhat.com/security/cve/CVE-2014-9621 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9621 https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c https://security.gentoo.org/glsa/201503-08 https://ubuntu.com/security/notices/USN-3686-1 https://usn.ubuntu.com/3686-1/
|
file |
CVE-2014-9653 |
LOW |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
Expand...http://bugs.gw.com/view.php?id=409 http://marc.info/?l=bugtraq&m=143748090628601&w=2 http://marc.info/?l=bugtraq&m=144050155601375&w=2 http://mx.gw.com/pipermail/file/2014/001649.html http://openwall.com/lists/oss-security/2015/02/05/13 http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-0760.html http://www.debian.org/security/2015/dsa-3196 http://www.openwall.com/lists/oss-security/2015/02/04/13 http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securityfocus.com/bid/72516 https://access.redhat.com/security/cve/CVE-2014-9653 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9653 https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f https://linux.oracle.com/cve/CVE-2014-9653.html https://linux.oracle.com/errata/ELSA-2016-0760.html https://security.gentoo.org/glsa/201701-42 https://ubuntu.com/security/notices/USN-3686-1 https://usn.ubuntu.com/3686-1/
|
file |
CVE-2015-8865 |
LOW |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
Expand...http://bugs.gw.com/view.php?id=522 http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85802 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8865 https://bugs.php.net/bug.php?id=71527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865 https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://security.gentoo.org/glsa/201701-42 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://ubuntu.com/security/notices/USN-3686-1 https://ubuntu.com/security/notices/USN-3686-2 https://usn.ubuntu.com/3686-1/ https://usn.ubuntu.com/3686-2/
|
file |
CVE-2018-10360 |
LOW |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html https://access.redhat.com/security/cve/CVE-2018-10360 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10360 https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22 https://linux.oracle.com/cve/CVE-2018-10360.html https://linux.oracle.com/errata/ELSA-2020-1022.html https://security.gentoo.org/glsa/201806-08 https://ubuntu.com/security/notices/USN-3686-1 https://ubuntu.com/security/notices/USN-3686-2 https://usn.ubuntu.com/3686-1/ https://usn.ubuntu.com/3686-2/
|
git |
CVE-2016-2315 |
HIGH |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.3 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183147.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179121.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180763.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00061.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00062.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00074.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00076.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00077.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00011.html http://pastebin.com/UX2P2jjg http://rhn.redhat.com/errata/RHSA-2016-0496.html http://www.debian.org/security/2016/dsa-3521 http://www.openwall.com/lists/oss-security/2016/03/15/5 http://www.openwall.com/lists/oss-security/2016/03/16/2 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/84355 http://www.securitytracker.com/id/1035290 http://www.ubuntu.com/usn/USN-2938-1 https://access.redhat.com/security/cve/CVE-2016-2315 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315 https://github.com/git/git/commit/34fa79a6cde56d6d428ab0d3160cb094ebad3305 https://github.com/git/git/commit/de1e67d0703894cb6ea782e36abb63976ab07e60 https://linux.oracle.com/cve/CVE-2016-2315.html https://linux.oracle.com/errata/ELSA-2016-0496.html https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.7.4.txt https://security.gentoo.org/glsa/201605-01 https://ubuntu.com/security/notices/USN-2938-1
|
git |
CVE-2018-11235 |
HIGH |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.8 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html http://www.securityfocus.com/bid/104345 http://www.securitytracker.com/id/1040991 https://access.redhat.com/errata/RHSA-2018:1957 https://access.redhat.com/errata/RHSA-2018:2147 https://access.redhat.com/security/cve/CVE-2018-11235 https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235 https://linux.oracle.com/cve/CVE-2018-11235.html https://linux.oracle.com/errata/ELSA-2018-1957.html https://lkml.org/lkml/2018/5/29/889 https://marc.info/?l=git&m=152761328506724&w=2 https://security.gentoo.org/glsa/201805-13 https://ubuntu.com/security/notices/USN-3671-1 https://usn.ubuntu.com/3671-1/ https://www.debian.org/security/2018/dsa-4212 https://www.edwardthomson.com/blog/upgrading_git_for_cve2018_11235.html https://www.exploit-db.com/exploits/44822/
|
git |
CVE-2014-9938 |
MEDIUM |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.4 |
Expand...https://access.redhat.com/errata/RHSA-2017:2004 https://access.redhat.com/security/cve/CVE-2014-9938 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9938 https://github.com/git/git/commit/8976500cbbb13270398d3b3e07a17b8cc7bff43f https://github.com/njhartwell/pw3nage https://linux.oracle.com/cve/CVE-2014-9938.html https://linux.oracle.com/errata/ELSA-2017-2004.html https://ubuntu.com/security/notices/USN-3243-1
|
git |
CVE-2016-2324 |
MEDIUM |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.3 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183147.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179121.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180763.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00061.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00062.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00074.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00076.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00077.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00011.html http://pastebin.com/UX2P2jjg http://rhn.redhat.com/errata/RHSA-2016-0496.html http://www.debian.org/security/2016/dsa-3521 http://www.openwall.com/lists/oss-security/2016/03/15/5 http://www.openwall.com/lists/oss-security/2016/03/16/2 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/84355 http://www.securitytracker.com/id/1035290 http://www.ubuntu.com/usn/USN-2938-1 https://access.redhat.com/security/cve/CVE-2016-2324 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324 https://github.com/git/git/commit/de1e67d0703894cb6ea782e36abb63976ab07e60 https://linux.oracle.com/cve/CVE-2016-2324.html https://linux.oracle.com/errata/ELSA-2016-0496.html https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.7.4.txt https://security.gentoo.org/glsa/201605-01 https://ubuntu.com/security/notices/USN-2938-1
|
git |
CVE-2017-1000117 |
MEDIUM |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.6 |
Expand...http://blog.recurity-labs.com/2017-08-10/scm-vulns http://marc.info/?l=git&m=150238802328673&w=2 http://www.debian.org/security/2017/dsa-3934 http://www.securityfocus.com/bid/100283 http://www.securitytracker.com/id/1039131 https://access.redhat.com/errata/RHSA-2017:2484 https://access.redhat.com/errata/RHSA-2017:2485 https://access.redhat.com/errata/RHSA-2017:2491 https://access.redhat.com/errata/RHSA-2017:2674 https://access.redhat.com/errata/RHSA-2017:2675 https://access.redhat.com/security/cve/CVE-2017-1000117 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117 https://linux.oracle.com/cve/CVE-2017-1000117.html https://linux.oracle.com/errata/ELSA-2017-2485.html https://lkml.org/lkml/2017/8/10/757 https://security.gentoo.org/glsa/201709-10 https://support.apple.com/HT208103 https://ubuntu.com/security/notices/USN-3387-1 https://www.exploit-db.com/exploits/42599/ https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1466490.html
|
git |
CVE-2017-14867 |
MEDIUM |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.7 |
Expand...http://www.openwall.com/lists/oss-security/2017/09/26/9 http://www.securityfocus.com/bid/101060 http://www.securitytracker.com/id/1039431 https://access.redhat.com/security/cve/CVE-2017-14867 https://bugs.debian.org/876854 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14867 https://lists.debian.org/debian-security-announce/2017/msg00246.html https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/T/#u https://ubuntu.com/security/notices/USN-3438-1 https://www.debian.org/security/2017/dsa-3984
|
git |
CVE-2017-8386 |
MEDIUM |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-updates/2017-05/msg00090.html http://lkml.iu.edu/hypermail/linux/kernel/1705.1/01337.html http://lkml.iu.edu/hypermail/linux/kernel/1705.1/01346.html http://public-inbox.org/git/xmqq8tm5ziat.fsf@gitster.mtv.corp.google.com/ http://www.debian.org/security/2017/dsa-3848 http://www.securityfocus.com/bid/98409 http://www.securitytracker.com/id/1038479 http://www.ubuntu.com/usn/USN-3287-1 https://access.redhat.com/errata/RHSA-2017:2004 https://access.redhat.com/errata/RHSA-2017:2491 https://access.redhat.com/security/cve/CVE-2017-8386 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8386 https://insinuator.net/2017/05/git-shell-bypass-by-abusing-less-cve-2017-8386/ https://kernel.googlesource.com/pub/scm/git/git/+/3ec804490a265f4c418a321428c12f3f18b7eff5 https://linux.oracle.com/cve/CVE-2017-8386.html https://linux.oracle.com/errata/ELSA-2017-2004.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ISHYFLM2ACYHHY3JHCLF75X7UF4ZMDM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPYRN7APMHY4ZFDPAKD22J5R4QJFY2JP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDS3LSJJ3YGGQYIVPKQDVOCXWDSF6JGF/ https://security.gentoo.org/glsa/201706-04 https://ubuntu.com/security/notices/USN-3287-1
|
git |
CVE-2018-17456 |
MEDIUM |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html http://www.securityfocus.com/bid/105523 http://www.securityfocus.com/bid/107511 http://www.securitytracker.com/id/1041811 https://access.redhat.com/errata/RHSA-2018:3408 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2018:3541 https://access.redhat.com/errata/RHSA-2020:0316 https://access.redhat.com/security/cve/CVE-2018-17456 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456 https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404 https://github.com/git/git/commit/a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46 https://linux.oracle.com/cve/CVE-2018-17456.html https://linux.oracle.com/errata/ELSA-2020-0316.html https://marc.info/?l=git&m=153875888916397&w=2 https://public-inbox.org/git/xmqqy3bcuy3l.fsf@gitster-ct.c.googlers.com/ https://seclists.org/bugtraq/2019/Mar/30 https://ubuntu.com/security/notices/USN-3791-1 https://usn.ubuntu.com/3791-1/ https://www.debian.org/security/2018/dsa-4311 https://www.exploit-db.com/exploits/45548/ https://www.exploit-db.com/exploits/45631/ https://www.openwall.com/lists/oss-security/2018/10/06/3
|
git |
CVE-2017-15298 |
LOW |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.10 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://access.redhat.com/security/cve/CVE-2017-15298 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298 https://github.com/Katee/git-bomb https://kate.io/blog/git-bomb/ https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2 https://ubuntu.com/security/notices/USN-3829-1 https://usn.ubuntu.com/3829-1/
|
git |
CVE-2018-11233 |
LOW |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.8 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html http://www.securityfocus.com/bid/104346 http://www.securitytracker.com/id/1040991 https://access.redhat.com/errata/RHSA-2018:2147 https://access.redhat.com/security/cve/CVE-2018-11233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11233 https://lkml.org/lkml/2018/5/29/889 https://marc.info/?l=git&m=152761328506724&w=2 https://security.gentoo.org/glsa/201805-13 https://ubuntu.com/security/notices/USN-3671-1 https://usn.ubuntu.com/3671-1/
|
git-man |
CVE-2016-2315 |
HIGH |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.3 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183147.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179121.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180763.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00061.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00062.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00074.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00076.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00077.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00011.html http://pastebin.com/UX2P2jjg http://rhn.redhat.com/errata/RHSA-2016-0496.html http://www.debian.org/security/2016/dsa-3521 http://www.openwall.com/lists/oss-security/2016/03/15/5 http://www.openwall.com/lists/oss-security/2016/03/16/2 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/84355 http://www.securitytracker.com/id/1035290 http://www.ubuntu.com/usn/USN-2938-1 https://access.redhat.com/security/cve/CVE-2016-2315 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315 https://github.com/git/git/commit/34fa79a6cde56d6d428ab0d3160cb094ebad3305 https://github.com/git/git/commit/de1e67d0703894cb6ea782e36abb63976ab07e60 https://linux.oracle.com/cve/CVE-2016-2315.html https://linux.oracle.com/errata/ELSA-2016-0496.html https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.7.4.txt https://security.gentoo.org/glsa/201605-01 https://ubuntu.com/security/notices/USN-2938-1
|
git-man |
CVE-2018-11235 |
HIGH |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.8 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html http://www.securityfocus.com/bid/104345 http://www.securitytracker.com/id/1040991 https://access.redhat.com/errata/RHSA-2018:1957 https://access.redhat.com/errata/RHSA-2018:2147 https://access.redhat.com/security/cve/CVE-2018-11235 https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235 https://linux.oracle.com/cve/CVE-2018-11235.html https://linux.oracle.com/errata/ELSA-2018-1957.html https://lkml.org/lkml/2018/5/29/889 https://marc.info/?l=git&m=152761328506724&w=2 https://security.gentoo.org/glsa/201805-13 https://ubuntu.com/security/notices/USN-3671-1 https://usn.ubuntu.com/3671-1/ https://www.debian.org/security/2018/dsa-4212 https://www.edwardthomson.com/blog/upgrading_git_for_cve2018_11235.html https://www.exploit-db.com/exploits/44822/
|
git-man |
CVE-2014-9938 |
MEDIUM |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.4 |
Expand...https://access.redhat.com/errata/RHSA-2017:2004 https://access.redhat.com/security/cve/CVE-2014-9938 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9938 https://github.com/git/git/commit/8976500cbbb13270398d3b3e07a17b8cc7bff43f https://github.com/njhartwell/pw3nage https://linux.oracle.com/cve/CVE-2014-9938.html https://linux.oracle.com/errata/ELSA-2017-2004.html https://ubuntu.com/security/notices/USN-3243-1
|
git-man |
CVE-2016-2324 |
MEDIUM |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.3 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183147.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179121.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180763.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00061.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00062.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00074.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00076.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00077.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00011.html http://pastebin.com/UX2P2jjg http://rhn.redhat.com/errata/RHSA-2016-0496.html http://www.debian.org/security/2016/dsa-3521 http://www.openwall.com/lists/oss-security/2016/03/15/5 http://www.openwall.com/lists/oss-security/2016/03/16/2 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/84355 http://www.securitytracker.com/id/1035290 http://www.ubuntu.com/usn/USN-2938-1 https://access.redhat.com/security/cve/CVE-2016-2324 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324 https://github.com/git/git/commit/de1e67d0703894cb6ea782e36abb63976ab07e60 https://linux.oracle.com/cve/CVE-2016-2324.html https://linux.oracle.com/errata/ELSA-2016-0496.html https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.7.4.txt https://security.gentoo.org/glsa/201605-01 https://ubuntu.com/security/notices/USN-2938-1
|
git-man |
CVE-2017-1000117 |
MEDIUM |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.6 |
Expand...http://blog.recurity-labs.com/2017-08-10/scm-vulns http://marc.info/?l=git&m=150238802328673&w=2 http://www.debian.org/security/2017/dsa-3934 http://www.securityfocus.com/bid/100283 http://www.securitytracker.com/id/1039131 https://access.redhat.com/errata/RHSA-2017:2484 https://access.redhat.com/errata/RHSA-2017:2485 https://access.redhat.com/errata/RHSA-2017:2491 https://access.redhat.com/errata/RHSA-2017:2674 https://access.redhat.com/errata/RHSA-2017:2675 https://access.redhat.com/security/cve/CVE-2017-1000117 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117 https://linux.oracle.com/cve/CVE-2017-1000117.html https://linux.oracle.com/errata/ELSA-2017-2485.html https://lkml.org/lkml/2017/8/10/757 https://security.gentoo.org/glsa/201709-10 https://support.apple.com/HT208103 https://ubuntu.com/security/notices/USN-3387-1 https://www.exploit-db.com/exploits/42599/ https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1466490.html
|
git-man |
CVE-2017-14867 |
MEDIUM |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.7 |
Expand...http://www.openwall.com/lists/oss-security/2017/09/26/9 http://www.securityfocus.com/bid/101060 http://www.securitytracker.com/id/1039431 https://access.redhat.com/security/cve/CVE-2017-14867 https://bugs.debian.org/876854 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14867 https://lists.debian.org/debian-security-announce/2017/msg00246.html https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/T/#u https://ubuntu.com/security/notices/USN-3438-1 https://www.debian.org/security/2017/dsa-3984
|
git-man |
CVE-2017-8386 |
MEDIUM |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-updates/2017-05/msg00090.html http://lkml.iu.edu/hypermail/linux/kernel/1705.1/01337.html http://lkml.iu.edu/hypermail/linux/kernel/1705.1/01346.html http://public-inbox.org/git/xmqq8tm5ziat.fsf@gitster.mtv.corp.google.com/ http://www.debian.org/security/2017/dsa-3848 http://www.securityfocus.com/bid/98409 http://www.securitytracker.com/id/1038479 http://www.ubuntu.com/usn/USN-3287-1 https://access.redhat.com/errata/RHSA-2017:2004 https://access.redhat.com/errata/RHSA-2017:2491 https://access.redhat.com/security/cve/CVE-2017-8386 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8386 https://insinuator.net/2017/05/git-shell-bypass-by-abusing-less-cve-2017-8386/ https://kernel.googlesource.com/pub/scm/git/git/+/3ec804490a265f4c418a321428c12f3f18b7eff5 https://linux.oracle.com/cve/CVE-2017-8386.html https://linux.oracle.com/errata/ELSA-2017-2004.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ISHYFLM2ACYHHY3JHCLF75X7UF4ZMDM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPYRN7APMHY4ZFDPAKD22J5R4QJFY2JP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDS3LSJJ3YGGQYIVPKQDVOCXWDSF6JGF/ https://security.gentoo.org/glsa/201706-04 https://ubuntu.com/security/notices/USN-3287-1
|
git-man |
CVE-2018-17456 |
MEDIUM |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html http://www.securityfocus.com/bid/105523 http://www.securityfocus.com/bid/107511 http://www.securitytracker.com/id/1041811 https://access.redhat.com/errata/RHSA-2018:3408 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2018:3541 https://access.redhat.com/errata/RHSA-2020:0316 https://access.redhat.com/security/cve/CVE-2018-17456 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456 https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404 https://github.com/git/git/commit/a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46 https://linux.oracle.com/cve/CVE-2018-17456.html https://linux.oracle.com/errata/ELSA-2020-0316.html https://marc.info/?l=git&m=153875888916397&w=2 https://public-inbox.org/git/xmqqy3bcuy3l.fsf@gitster-ct.c.googlers.com/ https://seclists.org/bugtraq/2019/Mar/30 https://ubuntu.com/security/notices/USN-3791-1 https://usn.ubuntu.com/3791-1/ https://www.debian.org/security/2018/dsa-4311 https://www.exploit-db.com/exploits/45548/ https://www.exploit-db.com/exploits/45631/ https://www.openwall.com/lists/oss-security/2018/10/06/3
|
git-man |
CVE-2017-15298 |
LOW |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.10 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://access.redhat.com/security/cve/CVE-2017-15298 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298 https://github.com/Katee/git-bomb https://kate.io/blog/git-bomb/ https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2 https://ubuntu.com/security/notices/USN-3829-1 https://usn.ubuntu.com/3829-1/
|
git-man |
CVE-2018-11233 |
LOW |
1:1.9.1-1ubuntu0.2 |
1:1.9.1-1ubuntu0.8 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html http://www.securityfocus.com/bid/104346 http://www.securitytracker.com/id/1040991 https://access.redhat.com/errata/RHSA-2018:2147 https://access.redhat.com/security/cve/CVE-2018-11233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11233 https://lkml.org/lkml/2018/5/29/889 https://marc.info/?l=git&m=152761328506724&w=2 https://security.gentoo.org/glsa/201805-13 https://ubuntu.com/security/notices/USN-3671-1 https://usn.ubuntu.com/3671-1/
|
gnupg |
CVE-2016-6313 |
HIGH |
1.4.16-1ubuntu2.3 |
1.4.16-1ubuntu2.4 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2674.html http://www.debian.org/security/2016/dsa-3649 http://www.debian.org/security/2016/dsa-3650 http://www.securityfocus.com/bid/92527 http://www.securitytracker.com/id/1036635 http://www.ubuntu.com/usn/USN-3064-1 http://www.ubuntu.com/usn/USN-3065-1 https://access.redhat.com/security/cve/CVE-2016-6313 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS https://linux.oracle.com/cve/CVE-2016-6313.html https://linux.oracle.com/errata/ELSA-2016-2674.html https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html https://security.gentoo.org/glsa/201610-04 https://security.gentoo.org/glsa/201612-01 https://ubuntu.com/security/notices/USN-3064-1 https://ubuntu.com/security/notices/USN-3065-1
|
gnupg |
CVE-2017-7526 |
MEDIUM |
1.4.16-1ubuntu2.3 |
1.4.16-1ubuntu2.6 |
Expand...http://www.securityfocus.com/bid/99338 http://www.securitytracker.com/id/1038915 https://access.redhat.com/security/cve/CVE-2017-7526 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526 https://eprint.iacr.org/2017/627 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=78130828e9a140a9de4dafadbc844dbb64cb709a https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=e6a3dc9900433bbc8ad362a595a3837318c28fa9 https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html https://ubuntu.com/security/notices/USN-3347-1 https://ubuntu.com/security/notices/USN-3347-2 https://ubuntu.com/security/notices/USN-3733-1 https://ubuntu.com/security/notices/USN-3733-2 https://usn.ubuntu.com/3733-1/ https://usn.ubuntu.com/3733-2/ https://www.debian.org/security/2017/dsa-3901 https://www.debian.org/security/2017/dsa-3960
|
gnupg |
CVE-2018-12020 |
MEDIUM |
1.4.16-1ubuntu2.3 |
1.4.16-1ubuntu2.5 |
Expand...http://openwall.com/lists/oss-security/2018/06/08/2 http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html http://seclists.org/fulldisclosure/2019/Apr/38 http://www.openwall.com/lists/oss-security/2019/04/30/4 http://www.securityfocus.com/bid/104450 http://www.securitytracker.com/id/1041051 https://access.redhat.com/errata/RHSA-2018:2180 https://access.redhat.com/errata/RHSA-2018:2181 https://access.redhat.com/security/cve/CVE-2018-12020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020 https://dev.gnupg.org/T4012 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=210e402acd3e284b32db1901e43bf1470e659e49 (STABLE-BRANCH-2-2) https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2326851c60793653069494379b16d84e4c10a0ac (STABLE-BRANCH-1-4) https://github.com/RUB-NDS/Johnny-You-Are-Fired https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 https://linux.oracle.com/cve/CVE-2018-12020.html https://linux.oracle.com/errata/ELSA-2018-2181.html https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html https://neopg.io/blog/gpg-signature-spoof/ https://sourceforge.net/p/enigmail/forum/announce/thread/b948279f/ https://ubuntu.com/security/notices/USN-3675-1 https://ubuntu.com/security/notices/USN-3675-2 https://ubuntu.com/security/notices/USN-3675-3 https://ubuntu.com/security/notices/USN-3964-1 https://usn.ubuntu.com/3675-1/ https://usn.ubuntu.com/3675-2/ https://usn.ubuntu.com/3675-3/ https://usn.ubuntu.com/3964-1/ https://www.debian.org/security/2018/dsa-4222 https://www.debian.org/security/2018/dsa-4223 https://www.debian.org/security/2018/dsa-4224
|
gpgv |
CVE-2016-6313 |
HIGH |
1.4.16-1ubuntu2.3 |
1.4.16-1ubuntu2.4 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2674.html http://www.debian.org/security/2016/dsa-3649 http://www.debian.org/security/2016/dsa-3650 http://www.securityfocus.com/bid/92527 http://www.securitytracker.com/id/1036635 http://www.ubuntu.com/usn/USN-3064-1 http://www.ubuntu.com/usn/USN-3065-1 https://access.redhat.com/security/cve/CVE-2016-6313 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS https://linux.oracle.com/cve/CVE-2016-6313.html https://linux.oracle.com/errata/ELSA-2016-2674.html https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html https://security.gentoo.org/glsa/201610-04 https://security.gentoo.org/glsa/201612-01 https://ubuntu.com/security/notices/USN-3064-1 https://ubuntu.com/security/notices/USN-3065-1
|
gpgv |
CVE-2017-7526 |
MEDIUM |
1.4.16-1ubuntu2.3 |
1.4.16-1ubuntu2.6 |
Expand...http://www.securityfocus.com/bid/99338 http://www.securitytracker.com/id/1038915 https://access.redhat.com/security/cve/CVE-2017-7526 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526 https://eprint.iacr.org/2017/627 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=78130828e9a140a9de4dafadbc844dbb64cb709a https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=e6a3dc9900433bbc8ad362a595a3837318c28fa9 https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html https://ubuntu.com/security/notices/USN-3347-1 https://ubuntu.com/security/notices/USN-3347-2 https://ubuntu.com/security/notices/USN-3733-1 https://ubuntu.com/security/notices/USN-3733-2 https://usn.ubuntu.com/3733-1/ https://usn.ubuntu.com/3733-2/ https://www.debian.org/security/2017/dsa-3901 https://www.debian.org/security/2017/dsa-3960
|
gpgv |
CVE-2018-12020 |
MEDIUM |
1.4.16-1ubuntu2.3 |
1.4.16-1ubuntu2.5 |
Expand...http://openwall.com/lists/oss-security/2018/06/08/2 http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html http://seclists.org/fulldisclosure/2019/Apr/38 http://www.openwall.com/lists/oss-security/2019/04/30/4 http://www.securityfocus.com/bid/104450 http://www.securitytracker.com/id/1041051 https://access.redhat.com/errata/RHSA-2018:2180 https://access.redhat.com/errata/RHSA-2018:2181 https://access.redhat.com/security/cve/CVE-2018-12020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020 https://dev.gnupg.org/T4012 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=210e402acd3e284b32db1901e43bf1470e659e49 (STABLE-BRANCH-2-2) https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2326851c60793653069494379b16d84e4c10a0ac (STABLE-BRANCH-1-4) https://github.com/RUB-NDS/Johnny-You-Are-Fired https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 https://linux.oracle.com/cve/CVE-2018-12020.html https://linux.oracle.com/errata/ELSA-2018-2181.html https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html https://neopg.io/blog/gpg-signature-spoof/ https://sourceforge.net/p/enigmail/forum/announce/thread/b948279f/ https://ubuntu.com/security/notices/USN-3675-1 https://ubuntu.com/security/notices/USN-3675-2 https://ubuntu.com/security/notices/USN-3675-3 https://ubuntu.com/security/notices/USN-3964-1 https://usn.ubuntu.com/3675-1/ https://usn.ubuntu.com/3675-2/ https://usn.ubuntu.com/3675-3/ https://usn.ubuntu.com/3964-1/ https://www.debian.org/security/2018/dsa-4222 https://www.debian.org/security/2018/dsa-4223 https://www.debian.org/security/2018/dsa-4224
|
isc-dhcp-client |
CVE-2018-5732 |
MEDIUM |
4.2.4-7ubuntu12.4 |
4.2.4-7ubuntu12.12 |
Expand...https://access.redhat.com/security/cve/CVE-2018-5732 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732 https://kb.isc.org/article/AA-01565 https://kb.isc.org/article/AA-01565/75/CVE-2018-5732 https://kb.isc.org/docs/aa-01565 https://linux.oracle.com/cve/CVE-2018-5732.html https://linux.oracle.com/errata/ELSA-2018-0483.html https://ubuntu.com/security/notices/USN-3586-1 https://ubuntu.com/security/notices/USN-3586-2
|
isc-dhcp-client |
CVE-2018-5733 |
MEDIUM |
4.2.4-7ubuntu12.4 |
4.2.4-7ubuntu12.12 |
Expand...http://www.securityfocus.com/bid/103188 http://www.securitytracker.com/id/1040437 https://access.redhat.com/errata/RHSA-2018:0469 https://access.redhat.com/errata/RHSA-2018:0483 https://access.redhat.com/security/cve/CVE-2018-5733 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733 https://kb.isc.org/article/AA-01567 https://kb.isc.org/article/AA-01567/75/CVE-2018-5733 https://kb.isc.org/docs/aa-01567 https://linux.oracle.com/cve/CVE-2018-5733.html https://linux.oracle.com/errata/ELSA-2018-0483.html https://lists.debian.org/debian-lts-announce/2018/03/msg00015.html https://ubuntu.com/security/notices/USN-3586-1 https://ubuntu.com/security/notices/USN-3586-2 https://usn.ubuntu.com/3586-1/ https://usn.ubuntu.com/3586-2/ https://www.debian.org/security/2018/dsa-4133
|
isc-dhcp-client |
CVE-2016-2774 |
LOW |
4.2.4-7ubuntu12.4 |
4.2.4-7ubuntu12.12 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183458.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183640.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html http://rhn.redhat.com/errata/RHSA-2016-2590.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/84208 http://www.securitytracker.com/id/1035196 https://access.redhat.com/security/cve/CVE-2016-2774 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2774 https://kb.isc.org/article/AA-01354 https://linux.oracle.com/cve/CVE-2016-2774.html https://linux.oracle.com/errata/ELSA-2016-2590.html https://lists.debian.org/debian-lts-announce/2019/11/msg00023.html https://ubuntu.com/security/notices/USN-3586-1 https://usn.ubuntu.com/3586-1/
|
isc-dhcp-client |
CVE-2017-3144 |
LOW |
4.2.4-7ubuntu12.4 |
4.2.4-7ubuntu12.12 |
Expand...http://www.securityfocus.com/bid/102726 http://www.securitytracker.com/id/1040194 https://access.redhat.com/errata/RHSA-2018:0158 https://access.redhat.com/security/cve/CVE-2017-3144 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144 https://kb.isc.org/article/AA-01541 https://kb.isc.org/docs/aa-01541 https://linux.oracle.com/cve/CVE-2017-3144.html https://linux.oracle.com/errata/ELSA-2018-0158.html https://ubuntu.com/security/notices/USN-3586-1 https://usn.ubuntu.com/3586-1/ https://www.debian.org/security/2018/dsa-4133
|
isc-dhcp-common |
CVE-2018-5732 |
MEDIUM |
4.2.4-7ubuntu12.4 |
4.2.4-7ubuntu12.12 |
Expand...https://access.redhat.com/security/cve/CVE-2018-5732 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732 https://kb.isc.org/article/AA-01565 https://kb.isc.org/article/AA-01565/75/CVE-2018-5732 https://kb.isc.org/docs/aa-01565 https://linux.oracle.com/cve/CVE-2018-5732.html https://linux.oracle.com/errata/ELSA-2018-0483.html https://ubuntu.com/security/notices/USN-3586-1 https://ubuntu.com/security/notices/USN-3586-2
|
isc-dhcp-common |
CVE-2018-5733 |
MEDIUM |
4.2.4-7ubuntu12.4 |
4.2.4-7ubuntu12.12 |
Expand...http://www.securityfocus.com/bid/103188 http://www.securitytracker.com/id/1040437 https://access.redhat.com/errata/RHSA-2018:0469 https://access.redhat.com/errata/RHSA-2018:0483 https://access.redhat.com/security/cve/CVE-2018-5733 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733 https://kb.isc.org/article/AA-01567 https://kb.isc.org/article/AA-01567/75/CVE-2018-5733 https://kb.isc.org/docs/aa-01567 https://linux.oracle.com/cve/CVE-2018-5733.html https://linux.oracle.com/errata/ELSA-2018-0483.html https://lists.debian.org/debian-lts-announce/2018/03/msg00015.html https://ubuntu.com/security/notices/USN-3586-1 https://ubuntu.com/security/notices/USN-3586-2 https://usn.ubuntu.com/3586-1/ https://usn.ubuntu.com/3586-2/ https://www.debian.org/security/2018/dsa-4133
|
isc-dhcp-common |
CVE-2016-2774 |
LOW |
4.2.4-7ubuntu12.4 |
4.2.4-7ubuntu12.12 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183458.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183640.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html http://rhn.redhat.com/errata/RHSA-2016-2590.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/84208 http://www.securitytracker.com/id/1035196 https://access.redhat.com/security/cve/CVE-2016-2774 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2774 https://kb.isc.org/article/AA-01354 https://linux.oracle.com/cve/CVE-2016-2774.html https://linux.oracle.com/errata/ELSA-2016-2590.html https://lists.debian.org/debian-lts-announce/2019/11/msg00023.html https://ubuntu.com/security/notices/USN-3586-1 https://usn.ubuntu.com/3586-1/
|
isc-dhcp-common |
CVE-2017-3144 |
LOW |
4.2.4-7ubuntu12.4 |
4.2.4-7ubuntu12.12 |
Expand...http://www.securityfocus.com/bid/102726 http://www.securitytracker.com/id/1040194 https://access.redhat.com/errata/RHSA-2018:0158 https://access.redhat.com/security/cve/CVE-2017-3144 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144 https://kb.isc.org/article/AA-01541 https://kb.isc.org/docs/aa-01541 https://linux.oracle.com/cve/CVE-2017-3144.html https://linux.oracle.com/errata/ELSA-2018-0158.html https://ubuntu.com/security/notices/USN-3586-1 https://usn.ubuntu.com/3586-1/ https://www.debian.org/security/2018/dsa-4133
|
krb5-locales |
CVE-2015-8629 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0493.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/82801 http://www.securitytracker.com/id/1034914 https://access.redhat.com/security/cve/CVE-2015-8629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629 https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb https://linux.oracle.com/cve/CVE-2015-8629.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
krb5-locales |
CVE-2015-8630 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securitytracker.com/id/1034915 https://access.redhat.com/security/cve/CVE-2015-8630 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630 https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b https://linux.oracle.com/cve/CVE-2015-8630.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
krb5-locales |
CVE-2015-8631 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0493.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securitytracker.com/id/1034916 https://access.redhat.com/security/cve/CVE-2015-8631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631 https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2 https://linux.oracle.com/cve/CVE-2015-8631.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
krb5-locales |
CVE-2016-3119 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html http://rhn.redhat.com/errata/RHSA-2016-2591.html http://www.securityfocus.com/bid/85392 http://www.securitytracker.com/id/1035399 https://access.redhat.com/security/cve/CVE-2016-3119 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119 https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99 https://linux.oracle.com/cve/CVE-2016-3119.html https://linux.oracle.com/errata/ELSA-2016-2591.html https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
|
krb5-locales |
CVE-2016-3120 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458 http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html http://rhn.redhat.com/errata/RHSA-2016-2591.html http://web.mit.edu/kerberos/krb5-1.13/ http://web.mit.edu/kerberos/krb5-1.14/ http://www.securityfocus.com/bid/92132 http://www.securitytracker.com/id/1036442 https://access.redhat.com/security/cve/CVE-2016-3120 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120 https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7 https://linux.oracle.com/cve/CVE-2016-3120.html https://linux.oracle.com/errata/ELSA-2016-2591.html https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
|
krb5-locales |
CVE-2017-11368 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securityfocus.com/bid/100291 https://access.redhat.com/errata/RHSA-2018:0666 https://access.redhat.com/security/cve/CVE-2017-11368 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368 https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970 https://github.com/krb5/krb5/pull/678/files https://linux.oracle.com/cve/CVE-2017-11368.html https://linux.oracle.com/errata/ELSA-2018-0666.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HNWXM6OQU7G23MG7XWIOBRGP43ECLDT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBUTXMNZWMVJLQ4NDX5OQFPUVCJRLV3W/
|
krb5-locales |
CVE-2017-11462 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598 https://access.redhat.com/security/cve/CVE-2017-11462 https://bugzilla.redhat.com/show_bug.cgi?id=1488873 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462 https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
|
krb5-locales |
CVE-2018-5729 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securitytracker.com/id/1042071 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3071 https://access.redhat.com/security/cve/CVE-2018-5729 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869 https://bugzilla.redhat.com/show_bug.cgi?id=1551083 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729 https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1 https://linux.oracle.com/cve/CVE-2018-5729.html https://linux.oracle.com/errata/ELSA-2018-3071.html https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
|
krb5-locales |
CVE-2018-5730 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securitytracker.com/id/1042071 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3071 https://access.redhat.com/security/cve/CVE-2018-5730 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869 https://bugzilla.redhat.com/show_bug.cgi?id=1551082 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730 https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1 https://linux.oracle.com/cve/CVE-2018-5730.html https://linux.oracle.com/errata/ELSA-2018-3071.html https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
|
libapache2-mod-php5 |
CVE-2015-8835 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.securityfocus.com/bid/84426 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8835 https://bugs.php.net/bug.php?id=70081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835 https://ubuntu.com/security/notices/USN-2952-1
|
libapache2-mod-php5 |
CVE-2015-8838 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=97aa752fee61fccdec361279adbfb17a3c60f3f4 http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8838 https://bugs.php.net/bug.php?id=69669 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8838 https://ubuntu.com/security/notices/USN-2952-1
|
libapache2-mod-php5 |
CVE-2015-8866 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://framework.zend.com/security/advisory/ZF2015-06 -> Relation to CVE-2015-5161 http://git.php.net/?p=php-src.git;a=commit;h=de31324c221c1791b26350ba106cc26bad23ace9 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/21/8 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/87470 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8866 https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817 https://bugs.php.net/bug.php?id=64938 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866 https://ubuntu.com/security/notices/USN-2952-1
|
libapache2-mod-php5 |
CVE-2015-8867 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/21/8 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8867 https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1534203 https://bugs.php.net/bug.php?id=70014 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8867 https://ubuntu.com/security/notices/USN-2952-1
|
libapache2-mod-php5 |
CVE-2015-8876 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.php.net/ChangeLog-5.php https://access.redhat.com/security/cve/CVE-2015-8876 https://bugs.php.net/bug.php?id=70121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8876 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2015-8935 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/06/20/3 https://access.redhat.com/security/cve/CVE-2015-8935 https://bugs.php.net/bug.php?id=68978 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8935 https://github.com/php/php-src/commit/996faf964bba1aec06b153b370a7f20d3dd2bb8b?w=1 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-10160 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95783 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10160 https://bugs.php.net/bug.php?id=73768 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160 https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
libapache2-mod-php5 |
CVE-2016-10397 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99552 https://access.redhat.com/security/cve/CVE-2016-10397 https://bugs.php.net/bug.php?id=73192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10397 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
libapache2-mod-php5 |
CVE-2016-2554 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/02/22/5 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-2554 https://bugs.php.net/bug.php?id=71488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-2952-1
|
libapache2-mod-php5 |
CVE-2016-3141 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b1bd4119bcafab6f9a8f84d92cd65eec3afeface http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/10/5 http://www.openwall.com/lists/oss-security/2016/03/13/1 http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html http://www.securityfocus.com/bid/84271 http://www.securitytracker.com/id/1035255 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3141 https://bugs.php.net/bug.php?id=71587 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141 https://php.net/ChangeLog-5.php https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1
|
libapache2-mod-php5 |
CVE-2016-3185 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://php.net/ChangeLog-7.php#7.0.4 http://www.securityfocus.com/bid/84307 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3185 https://bugs.php.net/bug.php?id=70081 https://bugs.php.net/bug.php?id=71610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3185 https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba https://secure.php.net/ChangeLog-5.php#5.6.12 https://ubuntu.com/security/notices/USN-2952-1
|
libapache2-mod-php5 |
CVE-2016-4070 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85801 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4070 https://bugs.php.net/bug.php?id=71798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070 https://git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
libapache2-mod-php5 |
CVE-2016-4071 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85800 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4071 https://bugs.php.net/bug.php?id=71704 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4071 https://git.php.net/?p=php-src.git;a=commit;h=6e25966544fb1d2f3d7596e060ce9c9269bbdcf8 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://www.exploit-db.com/exploits/39645/
|
libapache2-mod-php5 |
CVE-2016-4072 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85993 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4072 https://bugs.php.net/bug.php?id=71860 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4072 https://gist.github.com/smalyshev/80b5c2909832872f2ba2 https://git.php.net/?p=php-src.git;a=commit;h=1e9b175204e3286d64dfd6c9f09151c31b5e099a https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
libapache2-mod-php5 |
CVE-2016-4073 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85991 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4073 https://bugs.php.net/bug.php?id=71906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4073 https://gist.github.com/smalyshev/d8355c96a657cc5dba70 https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
libapache2-mod-php5 |
CVE-2016-4342 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/28/2 http://www.securityfocus.com/bid/89154 https://access.redhat.com/security/cve/CVE-2016-4342 https://bugs.php.net/bug.php?id=71354 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://ubuntu.com/security/notices/USN-2984-1
|
libapache2-mod-php5 |
CVE-2016-4343 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/28/2 http://www.securityfocus.com/bid/89179 https://access.redhat.com/security/cve/CVE-2016-4343 https://bugs.php.net/bug.php?id=71331 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4343 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://ubuntu.com/security/notices/USN-2984-1
|
libapache2-mod-php5 |
CVE-2016-4538 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90173 https://access.redhat.com/security/cve/CVE-2016-4538 https://bugs.php.net/bug.php?id=72093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538 https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
libapache2-mod-php5 |
CVE-2016-4539 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90174 https://access.redhat.com/security/cve/CVE-2016-4539 https://bugs.php.net/bug.php?id=72099 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539 https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
libapache2-mod-php5 |
CVE-2016-5385 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-7.php#7.0.9 http://rhn.redhat.com/errata/RHSA-2016-1609.html http://rhn.redhat.com/errata/RHSA-2016-1610.html http://rhn.redhat.com/errata/RHSA-2016-1611.html http://rhn.redhat.com/errata/RHSA-2016-1612.html http://rhn.redhat.com/errata/RHSA-2016-1613.html http://www.debian.org/security/2016/dsa-3631 http://www.kb.cert.org/vuls/id/797896 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91821 http://www.securitytracker.com/id/1036335 https://access.redhat.com/security/cve/CVE-2016-5385 https://bugzilla.redhat.com/show_bug.cgi?id=1353794 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385 https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml https://github.com/advisories/GHSA-m6ch-gg5f-wxx3 https://github.com/guzzle/guzzle/releases/tag/6.2.1 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://httpoxy.org/ https://linux.oracle.com/cve/CVE-2016-5385.html https://linux.oracle.com/errata/ELSA-2016-1613.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/ https://nvd.nist.gov/vuln/detail/CVE-2016-5385 https://security.gentoo.org/glsa/201611-22 https://typo3.org/security/advisory/typo3-core-sa-2016-019 https://ubuntu.com/security/notices/USN-3045-1 https://www.drupal.org/SA-CORE-2016-003
|
libapache2-mod-php5 |
CVE-2016-5399 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://php.net/ChangeLog-7.php#7.0.9 http://rhn.redhat.com/errata/RHSA-2016-2598.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://seclists.org/fulldisclosure/2016/Jul/72 http://www.debian.org/security/2016/dsa-3631 http://www.openwall.com/lists/oss-security/2016/07/21/1 http://www.securityfocus.com/archive/1/538966/100/0/threaded http://www.securityfocus.com/bid/92051 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-5399 https://bugs.php.net/bug.php?id=72613 https://bugzilla.redhat.com/show_bug.cgi?id=1358395 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399 https://linux.oracle.com/cve/CVE-2016-5399.html https://linux.oracle.com/errata/ELSA-2016-2598.html https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3045-1 https://www.exploit-db.com/exploits/40155/
|
libapache2-mod-php5 |
CVE-2016-5768 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/5b597a2e5b28e2d5a52fc1be13f425f08f47cb62?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2598.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91396 https://access.redhat.com/security/cve/CVE-2016-5768 https://bugs.php.net/bug.php?id=72402 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://linux.oracle.com/cve/CVE-2016-5768.html https://linux.oracle.com/errata/ELSA-2016-2598.html https://marc.info/?l=oss-security&m=146668499803695&w=2 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-5769 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91399 https://access.redhat.com/security/cve/CVE-2016-5769 https://bugs.php.net/bug.php?id=72455 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://marc.info/?l=oss-security&m=146668499803695&w=2 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-5772 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91398 https://access.redhat.com/security/cve/CVE-2016-5772 https://bugs.php.net/bug.php?id=72340 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-6288 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=629e4da7cc8b174acdeab84969cbfc606a019b31 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.securityfocus.com/bid/92111 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6288 https://bugs.php.net/70480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-6289 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92074 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6289 https://bugs.php.net/72513 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-6290 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=3798eb6fd5dddb211b01d41495072fd9858d4e32 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92097 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6290 https://bugs.php.net/72562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-6291 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=eebcbd5de38a0f1c2876035402cb770e37476519 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92073 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6291 https://bugs.php.net/72603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-6292 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=41131cd41d2fd2e0c2f332a27988df75659c42e4 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92078 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6292 https://bugs.php.net/72618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-6294 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92115 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6294 https://bugs.php.net/72533 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-6295 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=cab1c3b3708eead315e033359d07049b23b147a3 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92094 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6295 https://bugs.php.net/72479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-6296 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e6c48213c22ed50b2b987b479fcc1ac709394caa http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92095 http://www.securitytracker.com/id/1036430 http://www.ubuntu.com/usn/USN-3059-1 https://access.redhat.com/security/cve/CVE-2016-6296 https://bugs.php.net/72606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296 https://lists.debian.org/debian-lts-announce/2019/11/msg00029.html https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1 https://ubuntu.com/security/notices/USN-3059-1
|
libapache2-mod-php5 |
CVE-2016-6297 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92099 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6297 https://bugs.php.net/72520 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-7127 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92757 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7127 https://bugs.php.net/bug.php?id=72730 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127 https://github.com/php/php-src/commit/1bd103df00f49cf4d4ade2cfe3f456ac058a4eae?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-7129 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92758 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7129 https://bugs.php.net/bug.php?id=72749 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129 https://github.com/php/php-src/commit/426aeb2808955ee3d3f52e0cfb102834cdb836a5?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-7130 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92764 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7130 https://bugs.php.net/bug.php?id=72750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130 https://github.com/php/php-src/commit/698a691724c0a949295991e5df091ce16f899e02?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-7131 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92768 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7131 https://bugs.php.net/bug.php?id=72790 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131 https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-7132 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92767 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7132 https://bugs.php.net/bug.php?id=72799 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132 https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-7411 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/93009 http://www.securitytracker.com/id/1036836 https://access.redhat.com/security/cve/CVE-2016-7411 https://bugs.php.net/bug.php?id=73052 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411 https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1
|
libapache2-mod-php5 |
CVE-2016-7412 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93005 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7412 https://bugs.php.net/bug.php?id=72293 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412 https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-7413 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93006 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7413 https://bugs.php.net/bug.php?id=72860 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413 https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-7414 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93004 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7414 https://bugs.php.net/bug.php?id=72928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414 https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-7417 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93007 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7417 https://bugs.php.net/bug.php?id=73029 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417 https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-7478 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7 http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf http://www.securityfocus.com/bid/95150 https://access.redhat.com/security/cve/CVE-2016-7478 https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf https://bugs.php.net/bug.php?id=73093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://www.youtube.com/watch?v=LDcaPstAuPk
|
libapache2-mod-php5 |
CVE-2016-7479 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7 http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf http://www.securityfocus.com/bid/95151 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7479 https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf https://bugs.php.net/bug.php?id=73092 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.youtube.com/watch?v=LDcaPstAuPk
|
libapache2-mod-php5 |
CVE-2016-9934 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html http://www.openwall.com/lists/oss-security/2016/12/12/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/94845 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-9934 https://bugs.php.net/bug.php?id=73331 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934 https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d https://ubuntu.com/security/notices/USN-3196-1
|
libapache2-mod-php5 |
CVE-2016-9935 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html http://www.debian.org/security/2016/dsa-3737 http://www.openwall.com/lists/oss-security/2016/12/12/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/94846 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-9935 https://bugs.php.net/bug.php?id=73631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935 https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 https://security.gentoo.org/glsa/201702-29 https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1
|
libapache2-mod-php5 |
CVE-2017-11143 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://www.securityfocus.com/bid/99553 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11143 https://bugs.php.net/bug.php?id=74145 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143 https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
libapache2-mod-php5 |
CVE-2017-11144 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=73cabfedf519298e1a11192699f44d53c529315e http://git.php.net/?p=php-src.git;a=commit;h=89637c6b41b510c20d262c17483f582f115c66d6 http://git.php.net/?p=php-src.git;a=commit;h=91826a311dd37f4c4e5d605fa7af331e80ddd4c3 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11144 https://bugs.php.net/bug.php?id=74651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
libapache2-mod-php5 |
CVE-2017-11145 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e8b7698f5ee757ce2c8bd10a192a491a498f891c http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99550 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11145 https://bugs.php.net/bug.php?id=74819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145 https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
libapache2-mod-php5 |
CVE-2017-11147 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99607 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11147 https://bugs.php.net/bug.php?id=73773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11147 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.tenable.com/security/tns-2017-12
|
libapache2-mod-php5 |
CVE-2017-11628 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c http://www.securityfocus.com/bid/99489 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11628 https://bugs.php.net/bug.php?id=74603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628 https://security.gentoo.org/glsa/201709-21 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081
|
libapache2-mod-php5 |
CVE-2017-9224 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/101244 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9224 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224 https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b https://github.com/kkos/oniguruma/issues/57 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
libapache2-mod-php5 |
CVE-2017-9226 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/101244 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226 https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6 https://github.com/kkos/oniguruma/issues/55 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
libapache2-mod-php5 |
CVE-2017-9227 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/100538 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9227 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227 https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814 https://github.com/kkos/oniguruma/issues/58 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
libapache2-mod-php5 |
CVE-2017-9228 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228 https://github.com/kkos/oniguruma/commit/3b63d12038c8d8fc278e81c942fa9bec7c704c8b https://github.com/kkos/oniguruma/issues/60 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
libapache2-mod-php5 |
CVE-2017-9229 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9229 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229 https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d https://github.com/kkos/oniguruma/issues/59 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
libapache2-mod-php5 |
CVE-2018-10545 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104022 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10545 https://bugs.php.net/bug.php?id=75605 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10545 https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
libapache2-mod-php5 |
CVE-2018-10546 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104019 http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10546 https://bugs.php.net/bug.php?id=76249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546 https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://usn.ubuntu.com/3646-1/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
libapache2-mod-php5 |
CVE-2018-10547 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10547 https://bugs.php.net/bug.php?id=76129 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547 https://linux.oracle.com/cve/CVE-2018-10547.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
libapache2-mod-php5 |
CVE-2018-10548 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104019 http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10548 https://bugs.php.net/bug.php?id=76248 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548 https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12 https://www.tenable.com/security/tns-2019-07
|
libapache2-mod-php5 |
CVE-2018-14883 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104871 https://access.redhat.com/security/cve/CVE-2018-14883 https://bugs.php.net/bug.php?id=76423 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883 https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-3766-1 https://ubuntu.com/security/notices/USN-3766-2 https://usn.ubuntu.com/3766-1/ https://usn.ubuntu.com/3766-2/ https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2018-12
|
libapache2-mod-php5 |
CVE-2018-17082 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-17082 https://bugs.php.net/bug.php?id=76582 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082 https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e https://lists.debian.org/debian-lts-announce/2018/09/msg00020.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180924-0001/ https://ubuntu.com/security/notices/USN-3766-1 https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2019-07
|
libapache2-mod-php5 |
CVE-2018-5712 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/102742 http://www.securityfocus.com/bid/104020 http://www.securitytracker.com/id/1040363 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-5712 https://bugs.php.net/bug.php?id=74782 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712 https://linux.oracle.com/cve/CVE-2018-5712.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html https://ubuntu.com/security/notices/USN-3566-1 https://ubuntu.com/security/notices/USN-3600-1 https://ubuntu.com/security/notices/USN-3600-2 https://usn.ubuntu.com/3566-1/ https://usn.ubuntu.com/3600-1/ https://usn.ubuntu.com/3600-2/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
libapache2-mod-php5 |
CVE-2018-7584 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.24 |
Expand...http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/103204 http://www.securitytracker.com/id/1041607 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-7584 https://bugs.php.net/bug.php?id=75981 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584 https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba https://linux.oracle.com/cve/CVE-2018-7584.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://ubuntu.com/security/notices/USN-3600-1 https://ubuntu.com/security/notices/USN-3600-2 https://usn.ubuntu.com/3600-1/ https://usn.ubuntu.com/3600-2/ https://www.debian.org/security/2018/dsa-4240 https://www.exploit-db.com/exploits/44846/ https://www.tenable.com/security/tns-2018-03 https://www.tenable.com/security/tns-2018-12
|
libapache2-mod-php5 |
CVE-2019-9020 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9020 https://bugs.php.net/bug.php?id=77242 https://bugs.php.net/bug.php?id=77249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020 https://linux.oracle.com/cve/CVE-2019-9020.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
libapache2-mod-php5 |
CVE-2019-9021 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/106747 http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9021 https://bugs.php.net/bug.php?id=77247 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9021 https://linux.oracle.com/cve/CVE-2019-9021.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
libapache2-mod-php5 |
CVE-2019-9022 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9022 https://bugs.php.net/bug.php?id=77369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9022 https://linux.oracle.com/cve/CVE-2019-9022.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4398 https://www.tenable.com/security/tns-2019-07
|
libapache2-mod-php5 |
CVE-2019-9023 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9023 https://bugs.php.net/bug.php?id=77370 https://bugs.php.net/bug.php?id=77371 https://bugs.php.net/bug.php?id=77381 https://bugs.php.net/bug.php?id=77382 https://bugs.php.net/bug.php?id=77385 https://bugs.php.net/bug.php?id=77394 https://bugs.php.net/bug.php?id=77418 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023 https://linux.oracle.com/cve/CVE-2019-9023.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://support.f5.com/csp/article/K06372014 https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
libapache2-mod-php5 |
CVE-2019-9024 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9024 https://bugs.php.net/bug.php?id=77380 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024 https://linux.oracle.com/cve/CVE-2019-9024.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
libapache2-mod-php5 |
CVE-2019-9638 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9638 https://bugs.php.net/bug.php?id=77563 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638 https://linux.oracle.com/cve/CVE-2019-9638.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
libapache2-mod-php5 |
CVE-2019-9639 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9639 https://bugs.php.net/bug.php?id=77659 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639 https://linux.oracle.com/cve/CVE-2019-9639.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
libapache2-mod-php5 |
CVE-2019-9640 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9640 https://bugs.php.net/bug.php?id=77540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640 https://linux.oracle.com/cve/CVE-2019-9640.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
libapache2-mod-php5 |
CVE-2019-9641 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/security/cve/CVE-2019-9641 https://bugs.php.net/bug.php?id=77509 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641 https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
libapache2-mod-php5 |
CVE-2014-9767 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/16/20 http://www.securityfocus.com/bid/76652 http://www.securitytracker.com/id/1035311 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2014-9767 https://bugs.php.net/bug.php?id=67996 https://bugs.php.net/bug.php?id=70350 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9767 https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686 https://ubuntu.com/security/notices/USN-2952-1
|
libapache2-mod-php5 |
CVE-2014-9912 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://www.openwall.com/lists/oss-security/2016/11/25/1 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/68549 https://access.redhat.com/security/cve/CVE-2014-9912 https://bugs.php.net/bug.php?id=67397 https://bugzilla.redhat.com/show_bug.cgi?id=1383569 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9912 https://marc.info/?l=oss-security&m=148003512008712&w=2 https://ubuntu.com/security/notices/USN-3196-1
|
libapache2-mod-php5 |
CVE-2015-4116 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=1cbd25ca15383394ffa9ee8601c5de4c0f2f90e1 http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php https://access.redhat.com/security/cve/CVE-2015-4116 https://bugs.php.net/bug.php?id=69737 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116 https://ubuntu.com/security/notices/USN-3045-1 https://www.htbridge.com/advisory/HTB23262
|
libapache2-mod-php5 |
CVE-2015-8865 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://bugs.gw.com/view.php?id=522 http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85802 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8865 https://bugs.php.net/bug.php?id=71527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865 https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://security.gentoo.org/glsa/201701-42 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://ubuntu.com/security/notices/USN-3686-1 https://ubuntu.com/security/notices/USN-3686-2 https://usn.ubuntu.com/3686-1/ https://usn.ubuntu.com/3686-2/
|
libapache2-mod-php5 |
CVE-2015-8873 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=4d2278143a08b7522de9471d0f014d7357c28fea http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html https://access.redhat.com/security/cve/CVE-2015-8873 https://bugs.php.net/bug.php?id=69793 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8873 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2015-8994 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://marc.info/?l=php-internals&m=147876797317925&w=2 http://marc.info/?l=php-internals&m=147921016724565&w=2 http://openwall.com/lists/oss-security/2017/02/28/1 http://seclists.org/oss-sec/2016/q4/343 http://seclists.org/oss-sec/2017/q1/520 https://access.redhat.com/security/cve/CVE-2015-8994 https://bugs.php.net/bug.php?id=69090 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8994 https://ma.ttias.be/a-better-way-to-run-php-fpm/ https://ubuntu.com/security/notices/USN-3382-1
|
libapache2-mod-php5 |
CVE-2016-10158 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95764 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10158 https://bugs.php.net/bug.php?id=73737 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158 https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
libapache2-mod-php5 |
CVE-2016-10159 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95774 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10159 https://bugs.php.net/bug.php?id=73764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159 https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93 https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
libapache2-mod-php5 |
CVE-2016-10161 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95768 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10161 https://bugs.php.net/bug.php?id=73825 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161 https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2 https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
libapache2-mod-php5 |
CVE-2016-10712 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.24 |
Expand...https://access.redhat.com/security/cve/CVE-2016-10712 https://bugs.php.net/bug.php?id=71323 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10712 https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5 https://ubuntu.com/security/notices/USN-3566-2 https://ubuntu.com/security/notices/USN-3600-1 https://usn.ubuntu.com/3566-2/ https://usn.ubuntu.com/3600-1/
|
libapache2-mod-php5 |
CVE-2016-1903 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/01/14/8 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/79916 http://www.securitytracker.com/id/1034608 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-1903 https://bugs.php.net/bug.php?id=70976 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-2952-1
|
libapache2-mod-php5 |
CVE-2016-3142 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/10/5 http://www.openwall.com/lists/oss-security/2016/03/13/2 http://www.securitytracker.com/id/1035255 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3142 https://bugs.php.net/bug.php?id=71498 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142 https://git.php.net/?p=php-src.git;a=commit;h=a6fdc5bb27b20d889de0cd29318b3968aabb57bd https://php.net/ChangeLog-5.php https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1
|
libapache2-mod-php5 |
CVE-2016-4537 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90173 https://access.redhat.com/security/cve/CVE-2016-4537 https://bugs.php.net/bug.php?id=72093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537 https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
libapache2-mod-php5 |
CVE-2016-4540 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90172 https://access.redhat.com/security/cve/CVE-2016-4540 https://bugs.php.net/bug.php?id=72061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540 https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
libapache2-mod-php5 |
CVE-2016-4541 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90172 https://access.redhat.com/security/cve/CVE-2016-4541 https://bugs.php.net/bug.php?id=72061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541 https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
libapache2-mod-php5 |
CVE-2016-4542 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4542 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
libapache2-mod-php5 |
CVE-2016-4543 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4543 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
libapache2-mod-php5 |
CVE-2016-4544 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4544 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
libapache2-mod-php5 |
CVE-2016-5093 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90946 https://access.redhat.com/security/cve/CVE-2016-5093 https://bugs.php.net/bug.php?id=72241 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093 https://github.com/php/php-src/commit/97eff7eb57fc2320c267a949cffd622c38712484?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-5094 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90857 https://access.redhat.com/security/cve/CVE-2016-5094 https://bugs.php.net/bug.php?id=72135 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094 https://github.com/php/php-src/commit/0da8b8b801f9276359262f1ef8274c7812d3dfda?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-5095 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/92144 https://access.redhat.com/security/cve/CVE-2016-5095 https://bugs.php.net/bug.php?id=72135 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095 https://gist.github.com/8ef775c117d84ff15185953990a28576 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-5096 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90861 https://access.redhat.com/security/cve/CVE-2016-5096 https://bugs.php.net/bug.php?id=72114 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096 https://github.com/php/php-src/commit/abd159cce48f3e34f08e4751c568e09677d5ec9c?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-5114 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://seclists.org/bugtraq/2016/Jan/117 http://www.openwall.com/lists/oss-security/2016/02/02/4 http://www.openwall.com/lists/oss-security/2016/05/29/1 http://www.search-lab.hu/about-us/news/111-some-unusual-vulnerabilities-in-the-php-engine https://access.redhat.com/security/cve/CVE-2016-5114 https://bugs.php.net/bug.php?id=70755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-5771 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91401 https://access.redhat.com/security/cve/CVE-2016-5771 https://bugs.php.net/bug.php?id=72433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
libapache2-mod-php5 |
CVE-2016-5773 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91397 https://access.redhat.com/security/cve/CVE-2016-5773 https://bugs.php.net/bug.php?id=72434 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1 https://www.evonide.com/breaking-phps-garbage-collection-and-unserialize/
|
libapache2-mod-php5 |
CVE-2016-7124 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92756 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7124 https://bugs.php.net/bug.php?id=72663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124 https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-7125 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92552 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7125 https://bugs.php.net/bug.php?id=72681 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125 https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-7128 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92564 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7128 https://bugs.php.net/bug.php?id=72627 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128 https://github.com/php/php-src/commit/6dbb1ee46b5f4725cc6519abf91e512a2a10dfed?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-7416 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93008 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7416 https://bugs.php.net/bug.php?id=73007 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416 https://github.com/php/php-src/commit/6d55ba265637d6adf0ba7e9c9ef11187d1ec2f5b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-7418 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93011 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7418 https://bugs.php.net/bug.php?id=73065 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418 https://github.com/php/php-src/commit/c4cca4c20e75359c9a13a1f9a36cb7b4e9601d29?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2016-9137 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f http://www.debian.org/security/2016/dsa-3698 http://www.openwall.com/lists/oss-security/2016/10/18/1 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93577 https://access.redhat.com/security/cve/CVE-2016-9137 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137 https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2016-19
|
libapache2-mod-php5 |
CVE-2017-11362 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11362 https://bugs.php.net/bug.php?id=73473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11362 https://security.gentoo.org/glsa/201709-21 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3566-2 https://usn.ubuntu.com/3566-2/
|
libapache2-mod-php5 |
CVE-2017-12933 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99490 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-12933 https://bugs.php.net/bug.php?id=74111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933 https://ubuntu.com/security/notices/USN-3566-1 https://ubuntu.com/security/notices/USN-3566-2 https://usn.ubuntu.com/3566-1/ https://usn.ubuntu.com/3566-2/ https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081
|
libapache2-mod-php5 |
CVE-2017-16642 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/101745 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2017-16642 https://bugs.php.net/bug.php?id=75055 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642 https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536 https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1 https://security.netapp.com/advisory/ntap-20181123-0001/ https://ubuntu.com/security/notices/USN-3566-1 https://usn.ubuntu.com/3566-1/ https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.exploit-db.com/exploits/43133/
|
libapache2-mod-php5 |
CVE-2018-14851 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104871 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-14851 https://bugs.php.net/bug.php?id=76557 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851 https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-3766-1 https://ubuntu.com/security/notices/USN-3766-2 https://usn.ubuntu.com/3766-1/ https://usn.ubuntu.com/3766-2/ https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2018-12
|
libapache2-mod-php5 |
CVE-2019-9637 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9637 https://bugs.php.net/bug.php?id=77630 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637 https://linux.oracle.com/cve/CVE-2019-9637.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://support.f5.com/csp/article/K53825211 https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403 https://www.tenable.com/security/tns-2019-07
|
libapache2-mod-php5 |
CVE-2019-9675 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://php.net/ChangeLog-7.php https://access.redhat.com/security/cve/CVE-2019-9675 https://bugs.php.net/bug.php?id=77586 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675 https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/
|
libapt-inst1.5 |
CVE-2016-1252 |
HIGH |
1.0.1ubuntu2.10 |
1.0.1ubuntu2.17 |
Expand...http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html http://www.ubuntu.com/usn/USN-3156-1 https://bugs.chromium.org/p/project-zero/issues/detail?id=1020 https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1252 https://ubuntu.com/security/notices/USN-3156-1 https://www.debian.org/security/2016/dsa-3733 https://www.exploit-db.com/exploits/40916/
|
libapt-inst1.5 |
CVE-2019-3462 |
HIGH |
1.0.1ubuntu2.10 |
1.0.1ubuntu2.19 |
Expand...http://www.securityfocus.com/bid/106690 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3462 https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html https://security.netapp.com/advisory/ntap-20190125-0002/ https://ubuntu.com/security/notices/USN-3863-1 https://ubuntu.com/security/notices/USN-3863-2 https://usn.ubuntu.com/3863-1/ https://usn.ubuntu.com/3863-2/ https://www.debian.org/security/2019/dsa-4371
|
libapt-pkg4.12 |
CVE-2016-1252 |
HIGH |
1.0.1ubuntu2.10 |
1.0.1ubuntu2.17 |
Expand...http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html http://www.ubuntu.com/usn/USN-3156-1 https://bugs.chromium.org/p/project-zero/issues/detail?id=1020 https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1252 https://ubuntu.com/security/notices/USN-3156-1 https://www.debian.org/security/2016/dsa-3733 https://www.exploit-db.com/exploits/40916/
|
libapt-pkg4.12 |
CVE-2019-3462 |
HIGH |
1.0.1ubuntu2.10 |
1.0.1ubuntu2.19 |
Expand...http://www.securityfocus.com/bid/106690 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3462 https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html https://security.netapp.com/advisory/ntap-20190125-0002/ https://ubuntu.com/security/notices/USN-3863-1 https://ubuntu.com/security/notices/USN-3863-2 https://usn.ubuntu.com/3863-1/ https://usn.ubuntu.com/3863-2/ https://www.debian.org/security/2019/dsa-4371
|
libasn1-8-heimdal |
CVE-2017-11103 |
MEDIUM |
1.6~git20131207+dfsg-1ubuntu1.1 |
1.6~git20131207+dfsg-1ubuntu1.2 |
Expand...http://www.debian.org/security/2017/dsa-3912 http://www.h5l.org/advisories.html?show=2017-07-11 http://www.securityfocus.com/bid/99551 http://www.securitytracker.com/id/1038876 http://www.securitytracker.com/id/1039427 https://access.redhat.com/security/cve/CVE-2017-11103 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103 https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0 https://orpheus-lyre.info/ https://support.apple.com/HT208112 https://support.apple.com/HT208144 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3353-1 https://ubuntu.com/security/notices/USN-3353-2 https://ubuntu.com/security/notices/USN-3353-3 https://ubuntu.com/security/notices/USN-3353-4 https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc https://www.orpheus-lyre.info/ https://www.samba.org/samba/security/CVE-2017-11103.html
|
libc-bin |
CVE-2015-7547 |
HIGH |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.7 |
Expand...http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html http://marc.info/?l=bugtraq&m=145596041017029&w=2 http://marc.info/?l=bugtraq&m=145672440608228&w=2 http://marc.info/?l=bugtraq&m=145690841819314&w=2 http://marc.info/?l=bugtraq&m=145857691004892&w=2 http://marc.info/?l=bugtraq&m=146161017210491&w=2 http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html http://rhn.redhat.com/errata/RHSA-2016-0175.html http://rhn.redhat.com/errata/RHSA-2016-0176.html http://rhn.redhat.com/errata/RHSA-2016-0225.html http://rhn.redhat.com/errata/RHSA-2016-0277.html http://seclists.org/fulldisclosure/2019/Sep/7 http://seclists.org/fulldisclosure/2021/Sep/0 http://support.citrix.com/article/CTX206991 http://ubuntu.com/usn/usn-2900-1 http://www.debian.org/security/2016/dsa-3480 http://www.debian.org/security/2016/dsa-3481 http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html http://www.securityfocus.com/bid/83265 http://www.securitytracker.com/id/1035020 http://www.vmware.com/security/advisories/VMSA-2016-0002.html https://access.redhat.com/articles/2161461 https://access.redhat.com/security/cve/CVE-2015-7547 https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/ https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ https://bto.bluecoat.com/security-advisory/sa114 https://bugzilla.redhat.com/show_bug.cgi?id=1293532 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547 https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161 https://kc.mcafee.com/corporate/index?page=content&id=SB10150 https://linux.oracle.com/cve/CVE-2015-7547.html https://linux.oracle.com/errata/ELSA-2016-0176.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201602-02 https://security.netapp.com/advisory/ntap-20160217-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=18665 https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html https://support.lenovo.com/us/en/product_security/len_5450 https://ubuntu.com/security/notices/USN-2900-1 https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17 https://www.exploit-db.com/exploits/39454/ https://www.exploit-db.com/exploits/40339/ https://www.kb.cert.org/vuls/id/457759 https://www.tenable.com/security/research/tra-2017-08
|
libc-bin |
CVE-2018-1000001 |
HIGH |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://seclists.org/oss-sec/2018/q1/38 http://www.openwall.com/lists/oss-security/2018/01/11/5 http://www.securityfocus.com/bid/102525 http://www.securitytracker.com/id/1040162 https://access.redhat.com/errata/RHSA-2018:0805 https://access.redhat.com/security/cve/CVE-2018-1000001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001 https://linux.oracle.com/cve/CVE-2018-1000001.html https://linux.oracle.com/errata/ELSA-2018-0805.html https://lists.samba.org/archive/rsync/2018-February/031478.html https://security.netapp.com/advisory/ntap-20190404-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=18203 https://ubuntu.com/security/notices/USN-3534-1 https://ubuntu.com/security/notices/USN-3536-1 https://usn.ubuntu.com/3534-1/ https://usn.ubuntu.com/3536-1/ https://www.exploit-db.com/exploits/43775/ https://www.exploit-db.com/exploits/44889/ https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
|
libc-bin |
CVE-2015-5277 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://rhn.redhat.com/errata/RHSA-2015-2172.html http://seclists.org/fulldisclosure/2019/Sep/7 http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securityfocus.com/bid/78092 http://www.securitytracker.com/id/1034196 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/security/cve/CVE-2015-5277 https://bugzilla.redhat.com/show_bug.cgi?id=1262914 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277 https://linux.oracle.com/cve/CVE-2015-5277.html https://linux.oracle.com/errata/ELSA-2015-2172.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=17079 https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html https://ubuntu.com/security/notices/USN-2985-1
|
libc-bin |
CVE-2015-8982 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://openwall.com/lists/oss-security/2015/09/08/2 http://www.openwall.com/lists/oss-security/2015/02/13/3 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72602 https://access.redhat.com/security/cve/CVE-2015-8982 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://sourceware.org/bugzilla/show_bug.cgi?id=16009 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed https://ubuntu.com/security/notices/USN-3239-1
|
libc-bin |
CVE-2015-8983 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72740 https://access.redhat.com/security/cve/CVE-2015-8983 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983 https://sourceware.org/bugzilla/show_bug.cgi?id=17269 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
libc-bin |
CVE-2015-8984 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72789 https://access.redhat.com/security/cve/CVE-2015-8984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984 https://sourceware.org/bugzilla/show_bug.cgi?id=18032 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
libc-bin |
CVE-2016-2856 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403 http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/ http://www.openwall.com/lists/oss-security/2016/02/23/3 http://www.openwall.com/lists/oss-security/2016/03/07/2 http://www.securityfocus.com/bid/84601 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856 https://ubuntu.com/security/notices/USN-2985-1
|
libc-bin |
CVE-2017-1000366 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.13 |
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://seclists.org/fulldisclosure/2019/Sep/7 http://www.debian.org/security/2017/dsa-3887 http://www.securityfocus.com/bid/99127 http://www.securitytracker.com/id/1038712 https://access.redhat.com/errata/RHSA-2017:1479 https://access.redhat.com/errata/RHSA-2017:1480 https://access.redhat.com/errata/RHSA-2017:1481 https://access.redhat.com/errata/RHSA-2017:1567 https://access.redhat.com/errata/RHSA-2017:1712 https://access.redhat.com/security/cve/CVE-2017-1000366 https://access.redhat.com/security/vulnerabilities/stackguard https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366 https://kc.mcafee.com/corporate/index?page=content&id=SB10205 https://linux.oracle.com/cve/CVE-2017-1000366.html https://linux.oracle.com/errata/ELSA-2017-1481.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201706-19 https://ubuntu.com/security/notices/USN-3323-1 https://ubuntu.com/security/notices/USN-3323-2 https://www.exploit-db.com/exploits/42274/ https://www.exploit-db.com/exploits/42275/ https://www.exploit-db.com/exploits/42276/ https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt https://www.suse.com/security/cve/CVE-2017-1000366/ https://www.suse.com/support/kb/doc/?id=7020973
|
libc-bin |
CVE-2013-2207 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://secunia.com/advisories/55113 http://www.mandriva.com/security/advisories?name=MDVSA-2013:283 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/security/cve/CVE-2013-2207 https://bugzilla.redhat.com/show_bug.cgi?id=976408 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207 https://security.gentoo.org/glsa/201503-04 https://sourceware.org/bugzilla/show_bug.cgi?id=15755 https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html https://ubuntu.com/security/notices/USN-2985-1
|
libc-bin |
CVE-2014-8121 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://rhn.redhat.com/errata/RHSA-2015-0327.html http://www.debian.org/security/2016/dsa-3480 http://www.securityfocus.com/bid/73038 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/security/cve/CVE-2014-8121 https://bugzilla.redhat.com/show_bug.cgi?id=1165192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121 https://linux.oracle.com/cve/CVE-2014-8121.html https://linux.oracle.com/errata/ELSA-2015-0327.html https://security.gentoo.org/glsa/201602-02 https://sourceware.org/ml/libc-alpha/2015-02/msg00617.html https://ubuntu.com/security/notices/USN-2985-1
|
libc-bin |
CVE-2015-1781 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://www.debian.org/security/2016/dsa-3480 http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securityfocus.com/bid/74255 http://www.securitytracker.com/id/1032178 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/security/cve/CVE-2015-1781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781 https://linux.oracle.com/cve/CVE-2015-1781.html https://linux.oracle.com/errata/ELSA-2015-2199.html https://rhn.redhat.com/errata/RHSA-2015-0863.html https://security.gentoo.org/glsa/201602-02 https://sourceware.org/bugzilla/show_bug.cgi?id=18287 https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386 https://ubuntu.com/security/notices/USN-2985-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
libc-bin |
CVE-2015-8776 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html http://rhn.redhat.com/errata/RHSA-2017-0680.html http://www.debian.org/security/2016/dsa-3480 http://www.debian.org/security/2016/dsa-3481 http://www.openwall.com/lists/oss-security/2016/01/19/11 http://www.openwall.com/lists/oss-security/2016/01/20/1 http://www.securityfocus.com/bid/83277 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/errata/RHSA-2017:1916 https://access.redhat.com/security/cve/CVE-2015-8776 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776 https://linux.oracle.com/cve/CVE-2015-8776.html https://linux.oracle.com/errata/ELSA-2017-1916.html https://security.gentoo.org/glsa/201602-02 https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=18985 https://ubuntu.com/security/notices/USN-2985-1 https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
|
libc-bin |
CVE-2015-8777 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://www.debian.org/security/2016/dsa-3480 http://www.openwall.com/lists/oss-security/2015/09/05/8 http://www.openwall.com/lists/oss-security/2016/01/20/1 http://www.securityfocus.com/bid/81469 http://www.securitytracker.com/id/1034811 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/errata/RHSA-2017:1916 https://access.redhat.com/security/cve/CVE-2015-8777 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777 https://linux.oracle.com/cve/CVE-2015-8777.html https://linux.oracle.com/errata/ELSA-2017-1916.html https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=18928 https://ubuntu.com/security/notices/USN-2985-1
|
libc-bin |
CVE-2015-8778 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://rhn.redhat.com/errata/RHSA-2017-0680.html http://seclists.org/fulldisclosure/2019/Sep/7 http://www.debian.org/security/2016/dsa-3480 http://www.debian.org/security/2016/dsa-3481 http://www.openwall.com/lists/oss-security/2016/01/19/11 http://www.openwall.com/lists/oss-security/2016/01/20/1 http://www.securityfocus.com/bid/83275 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/errata/RHSA-2017:1916 https://access.redhat.com/security/cve/CVE-2015-8778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778 https://linux.oracle.com/cve/CVE-2015-8778.html https://linux.oracle.com/errata/ELSA-2017-1916.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201602-02 https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=18240 https://ubuntu.com/security/notices/USN-2985-1 https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
|
libc-bin |
CVE-2015-8779 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://rhn.redhat.com/errata/RHSA-2017-0680.html http://seclists.org/fulldisclosure/2019/Sep/7 http://www.debian.org/security/2016/dsa-3480 http://www.debian.org/security/2016/dsa-3481 http://www.openwall.com/lists/oss-security/2016/01/19/11 http://www.openwall.com/lists/oss-security/2016/01/20/1 http://www.securityfocus.com/bid/82244 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/errata/RHSA-2017:1916 https://access.redhat.com/security/cve/CVE-2015-8779 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779 https://linux.oracle.com/cve/CVE-2015-8779.html https://linux.oracle.com/errata/ELSA-2017-1916.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201602-02 https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=17905 https://ubuntu.com/security/notices/USN-2985-1 https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
|
libc-bin |
CVE-2016-1234 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html http://seclists.org/fulldisclosure/2021/Sep/0 http://www.openwall.com/lists/oss-security/2016/03/07/16 http://www.securityfocus.com/bid/84204 https://access.redhat.com/security/cve/CVE-2016-1234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=19779 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea https://ubuntu.com/security/notices/USN-3239-1
|
libc-bin |
CVE-2016-3075 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://rhn.redhat.com/errata/RHSA-2016-2573.html http://www.securityfocus.com/bid/85732 http://www.ubuntu.com/usn/USN-2985-1 https://access.redhat.com/security/cve/CVE-2016-3075 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075 https://linux.oracle.com/cve/CVE-2016-3075.html https://linux.oracle.com/errata/ELSA-2016-3638.html https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=19879 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=317b199b4aff8cfa27f2302ab404d2bb5032b9a4 https://ubuntu.com/security/notices/USN-2985-1
|
libc-bin |
CVE-2016-3706 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.securityfocus.com/bid/102073 http://www.securityfocus.com/bid/88440 https://access.redhat.com/security/cve/CVE-2016-3706 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706 https://source.android.com/security/bulletin/2017-12-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20010 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9 https://ubuntu.com/security/notices/USN-3239-1 https://ubuntu.com/security/notices/USN-3239-3
|
libc-bin |
CVE-2016-4429 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.securityfocus.com/bid/102073 https://access.redhat.com/security/cve/CVE-2016-4429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429 https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html https://source.android.com/security/bulletin/2017-12-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20112 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c https://ubuntu.com/security/notices/USN-3239-1 https://ubuntu.com/security/notices/USN-3759-1 https://ubuntu.com/security/notices/USN-3759-2 https://usn.ubuntu.com/3759-1/ https://usn.ubuntu.com/3759-2/
|
libc-bin |
CVE-2016-6323 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-10/msg00009.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.openwall.com/lists/oss-security/2016/08/18/12 http://www.securityfocus.com/bid/92532 https://access.redhat.com/security/cve/CVE-2016-6323 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KTXSOVCRDGBIB4WCIDAGYYUBESXZ4IGK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVWSAZVBTLALXF4SCBPDV3FY6J22DXLZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WO7IMEYWZ2WTXGGMZBWWSDCUMFN63XOB/ https://security.gentoo.org/glsa/201706-19 https://sourceware.org/bugzilla/show_bug.cgi?id=20435 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=9e2ff6c9cc54c0b4402b8d49e4abe7000fde7617 https://ubuntu.com/security/notices/USN-3239-1
|
libc-bin |
CVE-2017-1000408 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://seclists.org/oss-sec/2017/q4/385 http://www.openwall.com/lists/oss-security/2017/12/11/4 http://www.openwall.com/lists/oss-security/2019/06/27/7 http://www.openwall.com/lists/oss-security/2019/06/28/1 http://www.openwall.com/lists/oss-security/2019/06/28/2 https://access.redhat.com/security/cve/CVE-2017-1000408 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408 https://security.netapp.com/advisory/ntap-20190404-0003/ https://ubuntu.com/security/notices/USN-3534-1 https://www.exploit-db.com/exploits/43331/
|
libc-bin |
CVE-2017-1000409 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://seclists.org/oss-sec/2017/q4/385 http://www.openwall.com/lists/oss-security/2017/12/11/4 https://access.redhat.com/security/cve/CVE-2017-1000409 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409 https://security.netapp.com/advisory/ntap-20190404-0003/ https://ubuntu.com/security/notices/USN-3534-1 https://www.exploit-db.com/exploits/43331/
|
libc-bin |
CVE-2017-15670 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://www.securityfocus.com/bid/101521 https://access.redhat.com/errata/RHSA-2018:0805 https://access.redhat.com/errata/RHSA-2018:1879 https://access.redhat.com/security/cve/CVE-2017-15670 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670 https://linux.oracle.com/cve/CVE-2017-15670.html https://linux.oracle.com/errata/ELSA-2018-1879.html https://sourceware.org/bugzilla/show_bug.cgi?id=22320 https://ubuntu.com/security/notices/USN-3534-1
|
libc-bin |
CVE-2017-15804 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://www.securityfocus.com/bid/101535 https://access.redhat.com/errata/RHSA-2018:0805 https://access.redhat.com/errata/RHSA-2018:1879 https://access.redhat.com/security/cve/CVE-2017-15804 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804 https://linux.oracle.com/cve/CVE-2017-15804.html https://linux.oracle.com/errata/ELSA-2018-1879.html https://sourceware.org/bugzilla/show_bug.cgi?id=22332 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8 https://ubuntu.com/security/notices/USN-3534-1
|
libc-bin |
CVE-2017-16997 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://www.securityfocus.com/bid/102228 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3092 https://access.redhat.com/security/cve/CVE-2017-16997 https://bugs.debian.org/884615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997 https://linux.oracle.com/cve/CVE-2017-16997.html https://linux.oracle.com/errata/ELSA-2018-3092.html https://sourceware.org/bugzilla/show_bug.cgi?id=22625 https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html https://ubuntu.com/security/notices/USN-3534-1
|
libc6 |
CVE-2015-7547 |
HIGH |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.7 |
Expand...http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html http://marc.info/?l=bugtraq&m=145596041017029&w=2 http://marc.info/?l=bugtraq&m=145672440608228&w=2 http://marc.info/?l=bugtraq&m=145690841819314&w=2 http://marc.info/?l=bugtraq&m=145857691004892&w=2 http://marc.info/?l=bugtraq&m=146161017210491&w=2 http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html http://rhn.redhat.com/errata/RHSA-2016-0175.html http://rhn.redhat.com/errata/RHSA-2016-0176.html http://rhn.redhat.com/errata/RHSA-2016-0225.html http://rhn.redhat.com/errata/RHSA-2016-0277.html http://seclists.org/fulldisclosure/2019/Sep/7 http://seclists.org/fulldisclosure/2021/Sep/0 http://support.citrix.com/article/CTX206991 http://ubuntu.com/usn/usn-2900-1 http://www.debian.org/security/2016/dsa-3480 http://www.debian.org/security/2016/dsa-3481 http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html http://www.securityfocus.com/bid/83265 http://www.securitytracker.com/id/1035020 http://www.vmware.com/security/advisories/VMSA-2016-0002.html https://access.redhat.com/articles/2161461 https://access.redhat.com/security/cve/CVE-2015-7547 https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/ https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ https://bto.bluecoat.com/security-advisory/sa114 https://bugzilla.redhat.com/show_bug.cgi?id=1293532 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547 https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161 https://kc.mcafee.com/corporate/index?page=content&id=SB10150 https://linux.oracle.com/cve/CVE-2015-7547.html https://linux.oracle.com/errata/ELSA-2016-0176.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201602-02 https://security.netapp.com/advisory/ntap-20160217-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=18665 https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html https://support.lenovo.com/us/en/product_security/len_5450 https://ubuntu.com/security/notices/USN-2900-1 https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17 https://www.exploit-db.com/exploits/39454/ https://www.exploit-db.com/exploits/40339/ https://www.kb.cert.org/vuls/id/457759 https://www.tenable.com/security/research/tra-2017-08
|
libc6 |
CVE-2018-1000001 |
HIGH |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://seclists.org/oss-sec/2018/q1/38 http://www.openwall.com/lists/oss-security/2018/01/11/5 http://www.securityfocus.com/bid/102525 http://www.securitytracker.com/id/1040162 https://access.redhat.com/errata/RHSA-2018:0805 https://access.redhat.com/security/cve/CVE-2018-1000001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001 https://linux.oracle.com/cve/CVE-2018-1000001.html https://linux.oracle.com/errata/ELSA-2018-0805.html https://lists.samba.org/archive/rsync/2018-February/031478.html https://security.netapp.com/advisory/ntap-20190404-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=18203 https://ubuntu.com/security/notices/USN-3534-1 https://ubuntu.com/security/notices/USN-3536-1 https://usn.ubuntu.com/3534-1/ https://usn.ubuntu.com/3536-1/ https://www.exploit-db.com/exploits/43775/ https://www.exploit-db.com/exploits/44889/ https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
|
libc6 |
CVE-2015-5277 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://rhn.redhat.com/errata/RHSA-2015-2172.html http://seclists.org/fulldisclosure/2019/Sep/7 http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securityfocus.com/bid/78092 http://www.securitytracker.com/id/1034196 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/security/cve/CVE-2015-5277 https://bugzilla.redhat.com/show_bug.cgi?id=1262914 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277 https://linux.oracle.com/cve/CVE-2015-5277.html https://linux.oracle.com/errata/ELSA-2015-2172.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=17079 https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html https://ubuntu.com/security/notices/USN-2985-1
|
libc6 |
CVE-2015-8982 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://openwall.com/lists/oss-security/2015/09/08/2 http://www.openwall.com/lists/oss-security/2015/02/13/3 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72602 https://access.redhat.com/security/cve/CVE-2015-8982 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://sourceware.org/bugzilla/show_bug.cgi?id=16009 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed https://ubuntu.com/security/notices/USN-3239-1
|
libc6 |
CVE-2015-8983 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72740 https://access.redhat.com/security/cve/CVE-2015-8983 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983 https://sourceware.org/bugzilla/show_bug.cgi?id=17269 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
libc6 |
CVE-2015-8984 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72789 https://access.redhat.com/security/cve/CVE-2015-8984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984 https://sourceware.org/bugzilla/show_bug.cgi?id=18032 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
libc6 |
CVE-2016-2856 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403 http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/ http://www.openwall.com/lists/oss-security/2016/02/23/3 http://www.openwall.com/lists/oss-security/2016/03/07/2 http://www.securityfocus.com/bid/84601 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856 https://ubuntu.com/security/notices/USN-2985-1
|
libc6 |
CVE-2017-1000366 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.13 |
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://seclists.org/fulldisclosure/2019/Sep/7 http://www.debian.org/security/2017/dsa-3887 http://www.securityfocus.com/bid/99127 http://www.securitytracker.com/id/1038712 https://access.redhat.com/errata/RHSA-2017:1479 https://access.redhat.com/errata/RHSA-2017:1480 https://access.redhat.com/errata/RHSA-2017:1481 https://access.redhat.com/errata/RHSA-2017:1567 https://access.redhat.com/errata/RHSA-2017:1712 https://access.redhat.com/security/cve/CVE-2017-1000366 https://access.redhat.com/security/vulnerabilities/stackguard https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366 https://kc.mcafee.com/corporate/index?page=content&id=SB10205 https://linux.oracle.com/cve/CVE-2017-1000366.html https://linux.oracle.com/errata/ELSA-2017-1481.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201706-19 https://ubuntu.com/security/notices/USN-3323-1 https://ubuntu.com/security/notices/USN-3323-2 https://www.exploit-db.com/exploits/42274/ https://www.exploit-db.com/exploits/42275/ https://www.exploit-db.com/exploits/42276/ https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt https://www.suse.com/security/cve/CVE-2017-1000366/ https://www.suse.com/support/kb/doc/?id=7020973
|
libc6 |
CVE-2013-2207 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://secunia.com/advisories/55113 http://www.mandriva.com/security/advisories?name=MDVSA-2013:283 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/security/cve/CVE-2013-2207 https://bugzilla.redhat.com/show_bug.cgi?id=976408 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207 https://security.gentoo.org/glsa/201503-04 https://sourceware.org/bugzilla/show_bug.cgi?id=15755 https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html https://ubuntu.com/security/notices/USN-2985-1
|
libc6 |
CVE-2014-8121 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://rhn.redhat.com/errata/RHSA-2015-0327.html http://www.debian.org/security/2016/dsa-3480 http://www.securityfocus.com/bid/73038 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/security/cve/CVE-2014-8121 https://bugzilla.redhat.com/show_bug.cgi?id=1165192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121 https://linux.oracle.com/cve/CVE-2014-8121.html https://linux.oracle.com/errata/ELSA-2015-0327.html https://security.gentoo.org/glsa/201602-02 https://sourceware.org/ml/libc-alpha/2015-02/msg00617.html https://ubuntu.com/security/notices/USN-2985-1
|
libc6 |
CVE-2015-1781 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://www.debian.org/security/2016/dsa-3480 http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securityfocus.com/bid/74255 http://www.securitytracker.com/id/1032178 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/security/cve/CVE-2015-1781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781 https://linux.oracle.com/cve/CVE-2015-1781.html https://linux.oracle.com/errata/ELSA-2015-2199.html https://rhn.redhat.com/errata/RHSA-2015-0863.html https://security.gentoo.org/glsa/201602-02 https://sourceware.org/bugzilla/show_bug.cgi?id=18287 https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386 https://ubuntu.com/security/notices/USN-2985-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
libc6 |
CVE-2015-8776 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html http://rhn.redhat.com/errata/RHSA-2017-0680.html http://www.debian.org/security/2016/dsa-3480 http://www.debian.org/security/2016/dsa-3481 http://www.openwall.com/lists/oss-security/2016/01/19/11 http://www.openwall.com/lists/oss-security/2016/01/20/1 http://www.securityfocus.com/bid/83277 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/errata/RHSA-2017:1916 https://access.redhat.com/security/cve/CVE-2015-8776 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776 https://linux.oracle.com/cve/CVE-2015-8776.html https://linux.oracle.com/errata/ELSA-2017-1916.html https://security.gentoo.org/glsa/201602-02 https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=18985 https://ubuntu.com/security/notices/USN-2985-1 https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
|
libc6 |
CVE-2015-8777 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://www.debian.org/security/2016/dsa-3480 http://www.openwall.com/lists/oss-security/2015/09/05/8 http://www.openwall.com/lists/oss-security/2016/01/20/1 http://www.securityfocus.com/bid/81469 http://www.securitytracker.com/id/1034811 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/errata/RHSA-2017:1916 https://access.redhat.com/security/cve/CVE-2015-8777 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777 https://linux.oracle.com/cve/CVE-2015-8777.html https://linux.oracle.com/errata/ELSA-2017-1916.html https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=18928 https://ubuntu.com/security/notices/USN-2985-1
|
libc6 |
CVE-2015-8778 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://rhn.redhat.com/errata/RHSA-2017-0680.html http://seclists.org/fulldisclosure/2019/Sep/7 http://www.debian.org/security/2016/dsa-3480 http://www.debian.org/security/2016/dsa-3481 http://www.openwall.com/lists/oss-security/2016/01/19/11 http://www.openwall.com/lists/oss-security/2016/01/20/1 http://www.securityfocus.com/bid/83275 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/errata/RHSA-2017:1916 https://access.redhat.com/security/cve/CVE-2015-8778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778 https://linux.oracle.com/cve/CVE-2015-8778.html https://linux.oracle.com/errata/ELSA-2017-1916.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201602-02 https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=18240 https://ubuntu.com/security/notices/USN-2985-1 https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
|
libc6 |
CVE-2015-8779 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://rhn.redhat.com/errata/RHSA-2017-0680.html http://seclists.org/fulldisclosure/2019/Sep/7 http://www.debian.org/security/2016/dsa-3480 http://www.debian.org/security/2016/dsa-3481 http://www.openwall.com/lists/oss-security/2016/01/19/11 http://www.openwall.com/lists/oss-security/2016/01/20/1 http://www.securityfocus.com/bid/82244 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/errata/RHSA-2017:1916 https://access.redhat.com/security/cve/CVE-2015-8779 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779 https://linux.oracle.com/cve/CVE-2015-8779.html https://linux.oracle.com/errata/ELSA-2017-1916.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201602-02 https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=17905 https://ubuntu.com/security/notices/USN-2985-1 https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
|
libc6 |
CVE-2016-1234 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html http://seclists.org/fulldisclosure/2021/Sep/0 http://www.openwall.com/lists/oss-security/2016/03/07/16 http://www.securityfocus.com/bid/84204 https://access.redhat.com/security/cve/CVE-2016-1234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=19779 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea https://ubuntu.com/security/notices/USN-3239-1
|
libc6 |
CVE-2016-3075 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://rhn.redhat.com/errata/RHSA-2016-2573.html http://www.securityfocus.com/bid/85732 http://www.ubuntu.com/usn/USN-2985-1 https://access.redhat.com/security/cve/CVE-2016-3075 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075 https://linux.oracle.com/cve/CVE-2016-3075.html https://linux.oracle.com/errata/ELSA-2016-3638.html https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=19879 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=317b199b4aff8cfa27f2302ab404d2bb5032b9a4 https://ubuntu.com/security/notices/USN-2985-1
|
libc6 |
CVE-2016-3706 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.securityfocus.com/bid/102073 http://www.securityfocus.com/bid/88440 https://access.redhat.com/security/cve/CVE-2016-3706 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706 https://source.android.com/security/bulletin/2017-12-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20010 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9 https://ubuntu.com/security/notices/USN-3239-1 https://ubuntu.com/security/notices/USN-3239-3
|
libc6 |
CVE-2016-4429 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.securityfocus.com/bid/102073 https://access.redhat.com/security/cve/CVE-2016-4429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429 https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html https://source.android.com/security/bulletin/2017-12-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20112 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c https://ubuntu.com/security/notices/USN-3239-1 https://ubuntu.com/security/notices/USN-3759-1 https://ubuntu.com/security/notices/USN-3759-2 https://usn.ubuntu.com/3759-1/ https://usn.ubuntu.com/3759-2/
|
libc6 |
CVE-2016-6323 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-10/msg00009.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.openwall.com/lists/oss-security/2016/08/18/12 http://www.securityfocus.com/bid/92532 https://access.redhat.com/security/cve/CVE-2016-6323 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KTXSOVCRDGBIB4WCIDAGYYUBESXZ4IGK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVWSAZVBTLALXF4SCBPDV3FY6J22DXLZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WO7IMEYWZ2WTXGGMZBWWSDCUMFN63XOB/ https://security.gentoo.org/glsa/201706-19 https://sourceware.org/bugzilla/show_bug.cgi?id=20435 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=9e2ff6c9cc54c0b4402b8d49e4abe7000fde7617 https://ubuntu.com/security/notices/USN-3239-1
|
libc6 |
CVE-2017-1000408 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://seclists.org/oss-sec/2017/q4/385 http://www.openwall.com/lists/oss-security/2017/12/11/4 http://www.openwall.com/lists/oss-security/2019/06/27/7 http://www.openwall.com/lists/oss-security/2019/06/28/1 http://www.openwall.com/lists/oss-security/2019/06/28/2 https://access.redhat.com/security/cve/CVE-2017-1000408 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408 https://security.netapp.com/advisory/ntap-20190404-0003/ https://ubuntu.com/security/notices/USN-3534-1 https://www.exploit-db.com/exploits/43331/
|
libc6 |
CVE-2017-1000409 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://seclists.org/oss-sec/2017/q4/385 http://www.openwall.com/lists/oss-security/2017/12/11/4 https://access.redhat.com/security/cve/CVE-2017-1000409 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409 https://security.netapp.com/advisory/ntap-20190404-0003/ https://ubuntu.com/security/notices/USN-3534-1 https://www.exploit-db.com/exploits/43331/
|
libc6 |
CVE-2017-15670 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://www.securityfocus.com/bid/101521 https://access.redhat.com/errata/RHSA-2018:0805 https://access.redhat.com/errata/RHSA-2018:1879 https://access.redhat.com/security/cve/CVE-2017-15670 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670 https://linux.oracle.com/cve/CVE-2017-15670.html https://linux.oracle.com/errata/ELSA-2018-1879.html https://sourceware.org/bugzilla/show_bug.cgi?id=22320 https://ubuntu.com/security/notices/USN-3534-1
|
libc6 |
CVE-2017-15804 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://www.securityfocus.com/bid/101535 https://access.redhat.com/errata/RHSA-2018:0805 https://access.redhat.com/errata/RHSA-2018:1879 https://access.redhat.com/security/cve/CVE-2017-15804 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804 https://linux.oracle.com/cve/CVE-2017-15804.html https://linux.oracle.com/errata/ELSA-2018-1879.html https://sourceware.org/bugzilla/show_bug.cgi?id=22332 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8 https://ubuntu.com/security/notices/USN-3534-1
|
libc6 |
CVE-2017-16997 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://www.securityfocus.com/bid/102228 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3092 https://access.redhat.com/security/cve/CVE-2017-16997 https://bugs.debian.org/884615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997 https://linux.oracle.com/cve/CVE-2017-16997.html https://linux.oracle.com/errata/ELSA-2018-3092.html https://sourceware.org/bugzilla/show_bug.cgi?id=22625 https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html https://ubuntu.com/security/notices/USN-3534-1
|
libcurl3-gnutls |
CVE-2016-5419 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.8 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html http://rhn.redhat.com/errata/RHSA-2016-2575.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.debian.org/security/2016/dsa-3638 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/92292 http://www.securityfocus.com/bid/92319 http://www.securitytracker.com/id/1036538 http://www.securitytracker.com/id/1038341 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059 http://www.ubuntu.com/usn/USN-3048-1 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-5419 https://curl.haxx.se/docs/adv_20160803A.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419 https://linux.oracle.com/cve/CVE-2016-5419.html https://linux.oracle.com/errata/ELSA-2016-2575.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/ https://security.gentoo.org/glsa/201701-47 https://source.android.com/security/bulletin/2016-12-01.html https://ubuntu.com/security/notices/USN-3048-1 https://www.tenable.com/security/tns-2016-18
|
libcurl3-gnutls |
CVE-2016-5420 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.8 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html http://rhn.redhat.com/errata/RHSA-2016-2575.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.debian.org/security/2016/dsa-3638 http://www.openwall.com/lists/oss-security/2016/09/05/1 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/92309 http://www.securitytracker.com/id/1036537 http://www.securitytracker.com/id/1036739 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059 http://www.ubuntu.com/usn/USN-3048-1 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-5420 https://curl.haxx.se/docs/adv_20160803B.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420 https://linux.oracle.com/cve/CVE-2016-5420.html https://linux.oracle.com/errata/ELSA-2016-2575.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/ https://security.gentoo.org/glsa/201701-47 https://source.android.com/security/bulletin/2016-12-01.html https://ubuntu.com/security/notices/USN-3048-1 https://www.tenable.com/security/tns-2016-18
|
libcurl3-gnutls |
CVE-2016-5421 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.8 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html http://www.debian.org/security/2016/dsa-3638 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/92306 http://www.securitytracker.com/id/1036536 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059 http://www.ubuntu.com/usn/USN-3048-1 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-5421 https://curl.haxx.se/docs/adv_20160803C.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/ https://security.gentoo.org/glsa/201701-47 https://source.android.com/security/bulletin/2016-12-01.html https://ubuntu.com/security/notices/USN-3048-1 https://www.tenable.com/security/tns-2016-18
|
libcurl3-gnutls |
CVE-2016-8615 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.10 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94096 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8615 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615 https://curl.haxx.se/CVE-2016-8615.patch https://curl.haxx.se/docs/adv_20161102A.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615 https://linux.oracle.com/cve/CVE-2016-8615.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
libcurl3-gnutls |
CVE-2016-8617 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.10 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94097 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8617 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617 https://curl.haxx.se/CVE-2016-8617.patch https://curl.haxx.se/docs/adv_20161102C.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617 https://linux.oracle.com/cve/CVE-2016-8617.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
libcurl3-gnutls |
CVE-2016-8618 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.10 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94098 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8618 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618 https://curl.haxx.se/docs/adv_20161102D.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618 https://linux.oracle.com/cve/CVE-2016-8618.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
libcurl3-gnutls |
CVE-2016-8619 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.10 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94100 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8619 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619 https://curl.haxx.se/CVE-2016-8619.patch https://curl.haxx.se/docs/adv_20161102E.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619 https://linux.oracle.com/cve/CVE-2016-8619.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
libcurl3-gnutls |
CVE-2016-8620 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.10 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94102 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8620 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620 https://curl.haxx.se/docs/adv_20161102F.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620 https://linux.oracle.com/cve/CVE-2016-8620.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
libcurl3-gnutls |
CVE-2016-8622 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.10 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94105 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8622 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622 https://curl.haxx.se/docs/adv_20161102H.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622 https://linux.oracle.com/cve/CVE-2016-8622.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
libcurl3-gnutls |
CVE-2016-8623 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.10 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94106 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8623 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623 https://curl.haxx.se/CVE-2016-8623.patch https://curl.haxx.se/docs/adv_20161102I.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623 https://linux.oracle.com/cve/CVE-2016-8623.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
libcurl3-gnutls |
CVE-2016-8624 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.10 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94103 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8624 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624 https://curl.haxx.se/docs/adv_20161102J.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624 https://linux.oracle.com/cve/CVE-2016-8624.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
libcurl3-gnutls |
CVE-2017-1000254 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.11 |
Expand...http://www.debian.org/security/2017/dsa-3992 http://www.securityfocus.com/bid/101115 http://www.securitytracker.com/id/1039509 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-1000254 https://curl.haxx.se/673d0cd8.patch https://curl.haxx.se/docs/adv_20171004.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201712-04 https://support.apple.com/HT208331 https://ubuntu.com/security/notices/USN-3441-1 https://ubuntu.com/security/notices/USN-3441-2
|
libcurl3-gnutls |
CVE-2017-1000257 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.12 |
Expand...http://www.debian.org/security/2017/dsa-4007 http://www.securityfocus.com/bid/101519 http://www.securitytracker.com/id/1039644 https://access.redhat.com/errata/RHSA-2017:3263 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-1000257 https://curl.haxx.se/docs/adv_20171023.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257 https://linux.oracle.com/cve/CVE-2017-1000257.html https://linux.oracle.com/errata/ELSA-2017-3263.html https://security.gentoo.org/glsa/201712-04 https://ubuntu.com/security/notices/USN-3441-2 https://ubuntu.com/security/notices/USN-3457-1
|
libcurl3-gnutls |
CVE-2017-8817 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.13 |
Expand...http://security.cucumberlinux.com/security/details.php?id=162 http://www.securityfocus.com/bid/102057 http://www.securitytracker.com/id/1039897 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-8817 https://curl.haxx.se/docs/adv_2017-ae72.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817 https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html https://security.gentoo.org/glsa/201712-04 https://ubuntu.com/security/notices/USN-3498-1 https://ubuntu.com/security/notices/USN-3498-2 https://www.debian.org/security/2017/dsa-4051
|
libcurl3-gnutls |
CVE-2018-1000007 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.14 |
Expand...http://www.openwall.com/lists/oss-security/2022/04/27/4 http://www.securitytracker.com/id/1040274 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3157 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:1543 https://access.redhat.com/errata/RHSA-2020:0544 https://access.redhat.com/errata/RHSA-2020:0594 https://access.redhat.com/security/cve/CVE-2018-1000007 https://curl.haxx.se/docs/adv_2018-b3bf.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007 https://linux.oracle.com/cve/CVE-2018-1000007.html https://linux.oracle.com/errata/ELSA-2018-3157.html https://lists.debian.org/debian-lts-announce/2018/01/msg00038.html https://ubuntu.com/security/notices/USN-3554-1 https://ubuntu.com/security/notices/USN-3554-2 https://usn.ubuntu.com/3554-1/ https://usn.ubuntu.com/3554-2/ https://www.debian.org/security/2018/dsa-4098 https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
libcurl3-gnutls |
CVE-2018-1000120 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.15 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/103414 http://www.securitytracker.com/id/1040531 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3157 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:1543 https://access.redhat.com/errata/RHSA-2020:0544 https://access.redhat.com/errata/RHSA-2020:0594 https://access.redhat.com/security/cve/CVE-2018-1000120 https://curl.haxx.se/docs/adv_2018-9cd6.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120 https://linux.oracle.com/cve/CVE-2018-1000120.html https://linux.oracle.com/errata/ELSA-2018-3157.html https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html https://ubuntu.com/security/notices/USN-3598-1 https://ubuntu.com/security/notices/USN-3598-2 https://usn.ubuntu.com/3598-1/ https://usn.ubuntu.com/3598-2/ https://www.debian.org/security/2018/dsa-4136 https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
libcurl3-gnutls |
CVE-2018-1000121 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.15 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/103415 http://www.securitytracker.com/id/1040529 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3157 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2020:0544 https://access.redhat.com/errata/RHSA-2020:0594 https://access.redhat.com/security/cve/CVE-2018-1000121 https://curl.haxx.se/docs/adv_2018-97a2.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121 https://linux.oracle.com/cve/CVE-2018-1000121.html https://linux.oracle.com/errata/ELSA-2018-3157.html https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html https://ubuntu.com/security/notices/USN-3598-1 https://ubuntu.com/security/notices/USN-3598-2 https://usn.ubuntu.com/3598-1/ https://usn.ubuntu.com/3598-2/ https://www.debian.org/security/2018/dsa-4136 https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
libcurl3-gnutls |
CVE-2018-1000122 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.15 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/103436 http://www.securitytracker.com/id/1040530 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3157 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:1543 https://access.redhat.com/errata/RHSA-2020:0544 https://access.redhat.com/errata/RHSA-2020:0594 https://access.redhat.com/security/cve/CVE-2018-1000122 https://curl.haxx.se/docs/adv_2018-b047.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122 https://linux.oracle.com/cve/CVE-2018-1000122.html https://linux.oracle.com/errata/ELSA-2018-3157.html https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html https://ubuntu.com/security/notices/USN-3598-1 https://ubuntu.com/security/notices/USN-3598-2 https://usn.ubuntu.com/3598-1/ https://usn.ubuntu.com/3598-2/ https://www.debian.org/security/2018/dsa-4136 https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
libcurl3-gnutls |
CVE-2018-1000301 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.16 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/104225 http://www.securitytracker.com/id/1040931 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3157 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2020:0544 https://access.redhat.com/errata/RHSA-2020:0594 https://access.redhat.com/security/cve/CVE-2018-1000301 https://curl.haxx.se/docs/adv_2018-b138.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301 https://linux.oracle.com/cve/CVE-2018-1000301.html https://linux.oracle.com/errata/ELSA-2018-3157.html https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html https://security.gentoo.org/glsa/201806-05 https://ubuntu.com/security/notices/USN-3598-2 https://ubuntu.com/security/notices/USN-3648-1 https://usn.ubuntu.com/3598-2/ https://usn.ubuntu.com/3648-1/ https://www.debian.org/security/2018/dsa-4202 https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
libcurl3-gnutls |
CVE-2018-14618 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.17 |
Expand...http://www.securitytracker.com/id/1041605 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:1880 https://access.redhat.com/security/cve/CVE-2018-14618 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618 https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf https://curl.haxx.se/docs/CVE-2018-14618.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618 https://github.com/curl/curl/issues/2756 https://linux.oracle.com/cve/CVE-2018-14618.html https://linux.oracle.com/errata/ELSA-2019-1880.html https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014 https://security.gentoo.org/glsa/201903-03 https://ubuntu.com/security/notices/USN-3765-1 https://ubuntu.com/security/notices/USN-3765-2 https://usn.ubuntu.com/3765-1/ https://usn.ubuntu.com/3765-2/ https://www.debian.org/security/2018/dsa-4286
|
libcurl3-gnutls |
CVE-2018-16839 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.19 |
Expand...http://www.securitytracker.com/id/1042012 https://access.redhat.com/security/cve/CVE-2018-16839 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839 https://curl.haxx.se/docs/CVE-2018-16839.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839 https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5 https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html https://security.gentoo.org/glsa/201903-03 https://ubuntu.com/security/notices/USN-3805-1 https://usn.ubuntu.com/3805-1/ https://www.debian.org/security/2018/dsa-4331
|
libcurl3-gnutls |
CVE-2018-16842 |
MEDIUM |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.19 |
Expand...http://www.securitytracker.com/id/1042014 https://access.redhat.com/errata/RHSA-2019:2181 https://access.redhat.com/security/cve/CVE-2018-16842 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842 https://curl.haxx.se/docs/CVE-2018-16842.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842 https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211 https://linux.oracle.com/cve/CVE-2018-16842.html https://linux.oracle.com/errata/ELSA-2019-2181.html https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html https://security.gentoo.org/glsa/201903-03 https://ubuntu.com/security/notices/USN-3805-1 https://ubuntu.com/security/notices/USN-3805-2 https://usn.ubuntu.com/3805-1/ https://usn.ubuntu.com/3805-2/ https://www.debian.org/security/2018/dsa-4331 https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
libcurl3-gnutls |
CVE-2016-7141 |
LOW |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.10 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html http://rhn.redhat.com/errata/RHSA-2016-2575.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://seclists.org/oss-sec/2016/q3/419 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/92754 http://www.securitytracker.com/id/1036739 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-7141 https://bugzilla.redhat.com/show_bug.cgi?id=1373229 https://curl.haxx.se/docs/adv_20160907.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141 https://github.com/curl/curl/commit/curl-7_50_2~32 https://linux.oracle.com/cve/CVE-2016-7141.html https://linux.oracle.com/errata/ELSA-2016-2575.html https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1
|
libcurl3-gnutls |
CVE-2016-7167 |
LOW |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.10 |
Expand...http://openwall.com/lists/oss-security/2016/09/14/1 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/92975 http://www.securitytracker.com/id/1036813 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.538632 https://access.redhat.com/errata/RHSA-2017:2016 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-7167 https://curl.haxx.se/docs/adv_20160914.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167 https://linux.oracle.com/cve/CVE-2016-7167.html https://linux.oracle.com/errata/ELSA-2017-2016.html https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B3IU2FRXQNU6UJIQT4NGLWWTP2GJQXO7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTH54DFOS4TSYPG5XKJDGAG4XPAR4T7M/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZMRWVISG7VUCYRMF23A2UHMYD72VQWAK/ https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1
|
libcurl3-gnutls |
CVE-2016-8616 |
LOW |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.10 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94094 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8616 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616 https://curl.haxx.se/CVE-2016-8616.patch https://curl.haxx.se/docs/adv_20161102B.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616 https://linux.oracle.com/cve/CVE-2016-8616.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
libcurl3-gnutls |
CVE-2016-8621 |
LOW |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.10 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94101 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8621 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621 https://curl.haxx.se/CVE-2016-8621.patch https://curl.haxx.se/docs/adv_20161102G.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621 https://linux.oracle.com/cve/CVE-2016-8621.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
libcurl3-gnutls |
CVE-2016-9586 |
LOW |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.11 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/95019 http://www.securitytracker.com/id/1037515 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-9586 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586 https://curl.haxx.se/docs/adv_20161221A.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586 https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3441-1 https://ubuntu.com/security/notices/USN-3441-2
|
libcurl3-gnutls |
CVE-2017-1000100 |
LOW |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.11 |
Expand...http://www.debian.org/security/2017/dsa-3992 http://www.securityfocus.com/bid/100286 http://www.securitytracker.com/id/1039118 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-1000100 https://curl.haxx.se/docs/adv_20170809B.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100 https://security.gentoo.org/glsa/201709-14 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3441-1 https://ubuntu.com/security/notices/USN-3441-2
|
libcurl3-gnutls |
CVE-2017-1000101 |
LOW |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.11 |
Expand...http://www.debian.org/security/2017/dsa-3992 http://www.securityfocus.com/bid/100249 http://www.securitytracker.com/id/1039117 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-1000101 https://curl.haxx.se/docs/adv_20170809A.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101 https://security.gentoo.org/glsa/201709-14 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3441-1
|
libcurl3-gnutls |
CVE-2017-7407 |
LOW |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.11 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-7407 https://curl.haxx.se/docs/adv_20170403.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407 https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13 https://security.gentoo.org/glsa/201709-14 https://ubuntu.com/security/notices/USN-3441-1 https://ubuntu.com/security/notices/USN-3441-2
|
libcurl3-gnutls |
CVE-2019-3823 |
LOW |
7.35.0-1ubuntu2.6 |
7.35.0-1ubuntu2.20 |
Expand...http://www.securityfocus.com/bid/106950 https://access.redhat.com/errata/RHSA-2019:3701 https://access.redhat.com/security/cve/CVE-2019-3823 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823 https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf https://curl.haxx.se/docs/CVE-2019-3823.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823 https://linux.oracle.com/cve/CVE-2019-3823.html https://linux.oracle.com/errata/ELSA-2019-3701.html https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://security.gentoo.org/glsa/201903-03 https://security.netapp.com/advisory/ntap-20190315-0001/ https://ubuntu.com/security/notices/USN-3882-1 https://usn.ubuntu.com/3882-1/ https://www.debian.org/security/2019/dsa-4386 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
libdb5.3 |
CVE-2017-10140 |
MEDIUM |
5.3.28-3ubuntu3 |
5.3.28-3ubuntu3.1 |
Expand...http://seclists.org/oss-sec/2017/q3/285 http://www.openwall.com/lists/oss-security/2017/08/12/1 http://www.postfix.org/announcements/postfix-3.2.2.html https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/security/cve/CVE-2017-10140 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10140 https://ubuntu.com/security/notices/USN-3489-1 https://ubuntu.com/security/notices/USN-3489-2 https://www.oracle.com/security-alerts/cpujul2020.html
|
libdbd-mysql-perl |
CVE-2014-9906 |
MEDIUM |
4.025-1 |
4.025-1ubuntu0.1 |
Expand...http://cpansearch.perl.org/src/CAPTTOFU/DBD-mysql-4.029/ChangeLog http://www.debian.org/security/2016/dsa-3635 http://www.openwall.com/lists/oss-security/2016/07/27/5 http://www.openwall.com/lists/oss-security/2016/07/27/6 http://www.securityfocus.com/bid/92149 https://access.redhat.com/security/cve/CVE-2014-9906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9906 https://github.com/perl5-dbi/DBD-mysql/commit/a56ae87a4c1c1fead7d09c3653905841ccccf1cc https://github.com/perl5-dbi/DBD-mysql/pull/27 https://rt.cpan.org/Public/Bug/Display.html?id=97625 https://ubuntu.com/security/notices/USN-3103-1
|
libdbd-mysql-perl |
CVE-2015-8949 |
MEDIUM |
4.025-1 |
4.025-1ubuntu0.1 |
Expand...http://seclists.org/oss-sec/2016/q3/150 http://www.debian.org/security/2016/dsa-3635 http://www.openwall.com/lists/oss-security/2016/07/25/13 http://www.openwall.com/lists/oss-security/2016/07/27/1 http://www.securityfocus.com/bid/92118 https://access.redhat.com/security/cve/CVE-2015-8949 https://blog.fuzzing-project.org/50-Use-after-free-in-my_login-function-of-DBDmysql-Perl-module.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8949 https://github.com/perl5-dbi/DBD-mysql/blob/4.033_01/Changes https://github.com/perl5-dbi/DBD-mysql/commit/cf0aa7751f6ef8445e9310a64b14dc81460ca156 https://github.com/perl5-dbi/DBD-mysql/pull/45 https://security.gentoo.org/glsa/201701-51 https://ubuntu.com/security/notices/USN-3103-1
|
libdbd-mysql-perl |
CVE-2016-1246 |
MEDIUM |
4.025-1 |
4.025-1ubuntu0.1 |
Expand...http://blogs.perl.org/users/mike_b/2016/10/security-release---buffer-overflow-in-dbdmysql-perl-library.html http://www.debian.org/security/2016/dsa-3684 http://www.securityfocus.com/bid/93337 https://access.redhat.com/security/cve/CVE-2016-1246 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1246 https://github.com/perl5-dbi/DBD-mysql/commit/7c164a0c86cec6ee95df1d141e67b0e85dfdefd2 https://security.gentoo.org/glsa/201701-51 https://ubuntu.com/security/notices/USN-3103-1
|
libdbus-1-3 |
CVE-2015-0245 |
MEDIUM |
1.6.18-0ubuntu4.3 |
1.6.18-0ubuntu4.4 |
Expand...http://advisories.mageia.org/MGASA-2015-0071.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html http://www.debian.org/security/2015/dsa-3161 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.openwall.com/lists/oss-security/2015/02/09/6 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html https://access.redhat.com/security/cve/CVE-2015-0245 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245 https://ubuntu.com/security/notices/USN-3116-1
|
libexpat1 |
CVE-2012-6702 |
MEDIUM |
2.1.0-4ubuntu1.1 |
2.1.0-4ubuntu1.3 |
Expand...http://seclists.org/oss-sec/2016/q2/468 http://www.debian.org/security/2016/dsa-3597 http://www.openwall.com/lists/oss-security/2016/06/03/8 http://www.openwall.com/lists/oss-security/2016/06/04/1 http://www.securityfocus.com/bid/91483 http://www.ubuntu.com/usn/USN-3010-1 https://access.redhat.com/security/cve/CVE-2012-6702 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702 https://security.gentoo.org/glsa/201701-21 https://source.android.com/security/bulletin/2016-11-01.html https://ubuntu.com/security/notices/USN-3010-1 https://ubuntu.com/security/notices/USN-3013-1 https://www.tenable.com/security/tns-2016-20
|
libexpat1 |
CVE-2016-0718 |
MEDIUM |
2.1.0-4ubuntu1.1 |
2.1.0-4ubuntu1.2 |
Expand...http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html http://rhn.redhat.com/errata/RHSA-2016-2824.html http://seclists.org/fulldisclosure/2017/Feb/68 http://support.eset.com/ca6333/ http://www.debian.org/security/2016/dsa-3582 http://www.mozilla.org/security/announce/2016/mfsa2016-68.html http://www.openwall.com/lists/oss-security/2016/05/17/12 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/90729 http://www.securitytracker.com/id/1036348 http://www.securitytracker.com/id/1036415 http://www.securitytracker.com/id/1037705 http://www.ubuntu.com/usn/USN-2983-1 http://www.ubuntu.com/usn/USN-3044-1 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2016-0718 https://bugzilla.mozilla.org/show_bug.cgi?id=1236923 https://bugzilla.redhat.com/show_bug.cgi?id=1296102 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718 https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://linux.oracle.com/cve/CVE-2016-0718.html https://linux.oracle.com/errata/ELSA-2016-2824.html https://security.gentoo.org/glsa/201701-21 https://source.android.com/security/bulletin/2016-11-01.html https://support.apple.com/HT206903 https://ubuntu.com/security/notices/USN-2983-1 https://ubuntu.com/security/notices/USN-3013-1 https://ubuntu.com/security/notices/USN-3044-1 https://www.tenable.com/security/tns-2016-20
|
libexpat1 |
CVE-2016-5300 |
MEDIUM |
2.1.0-4ubuntu1.1 |
2.1.0-4ubuntu1.3 |
Expand...http://seclists.org/oss-sec/2016/q2/468 http://www.debian.org/security/2016/dsa-3597 http://www.openwall.com/lists/oss-security/2016/06/04/4 http://www.openwall.com/lists/oss-security/2016/06/04/5 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91159 http://www.ubuntu.com/usn/USN-3010-1 https://access.redhat.com/security/cve/CVE-2016-5300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300 https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-21 https://source.android.com/security/bulletin/2016-11-01.html https://ubuntu.com/security/notices/USN-3010-1 https://ubuntu.com/security/notices/USN-3013-1 https://www.tenable.com/security/tns-2016-20
|
libexpat1 |
CVE-2017-9233 |
MEDIUM |
2.1.0-4ubuntu1.1 |
2.1.0-4ubuntu1.4 |
Expand...http://www.debian.org/security/2017/dsa-3898 http://www.openwall.com/lists/oss-security/2017/06/17/7 http://www.securityfocus.com/bid/99276 http://www.securitytracker.com/id/1039427 https://access.redhat.com/security/cve/CVE-2017-9233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233 https://github.com/libexpat/libexpat/blob/master/expat/Changes https://libexpat.github.io/doc/cve-2017-9233/ https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://support.apple.com/HT208112 https://support.apple.com/HT208113 https://support.apple.com/HT208115 https://support.apple.com/HT208144 https://support.f5.com/csp/article/K03244804 https://ubuntu.com/security/notices/USN-3356-1 https://ubuntu.com/security/notices/USN-3356-2
|
libffi6 |
CVE-2017-1000376 |
MEDIUM |
3.1~rc1+r3.0.13-12ubuntu0.1 |
3.1~rc1+r3.0.13-12ubuntu0.2 |
Expand...http://www.debian.org/security/2017/dsa-3889 https://access.redhat.com/security/cve/CVE-2017-1000376 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000376 https://ubuntu.com/security/notices/USN-3454-1 https://ubuntu.com/security/notices/USN-3454-2 https://www.oracle.com/security-alerts/cpujan2020.html https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
|
libgcrypt11 |
CVE-2016-6313 |
HIGH |
1.5.3-2ubuntu4.2 |
1.5.3-2ubuntu4.4 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2674.html http://www.debian.org/security/2016/dsa-3649 http://www.debian.org/security/2016/dsa-3650 http://www.securityfocus.com/bid/92527 http://www.securitytracker.com/id/1036635 http://www.ubuntu.com/usn/USN-3064-1 http://www.ubuntu.com/usn/USN-3065-1 https://access.redhat.com/security/cve/CVE-2016-6313 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS https://linux.oracle.com/cve/CVE-2016-6313.html https://linux.oracle.com/errata/ELSA-2016-2674.html https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html https://security.gentoo.org/glsa/201610-04 https://security.gentoo.org/glsa/201612-01 https://ubuntu.com/security/notices/USN-3064-1 https://ubuntu.com/security/notices/USN-3065-1
|
libgcrypt11 |
CVE-2015-7511 |
MEDIUM |
1.5.3-2ubuntu4.2 |
1.5.3-2ubuntu4.3 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html http://www.cs.tau.ac.IL/~tromer/ecdh/ http://www.cs.tau.ac.il/~tromer/ecdh/ http://www.debian.org/security/2016/dsa-3474 http://www.debian.org/security/2016/dsa-3478 http://www.securityfocus.com/bid/83253 http://www.ubuntu.com/usn/USN-2896-1 https://access.redhat.com/security/cve/CVE-2015-7511 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/ https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html https://security.gentoo.org/glsa/201610-04 https://ubuntu.com/security/notices/USN-2896-1
|
libgcrypt11 |
CVE-2017-7526 |
MEDIUM |
1.5.3-2ubuntu4.2 |
1.5.3-2ubuntu4.5 |
Expand...http://www.securityfocus.com/bid/99338 http://www.securitytracker.com/id/1038915 https://access.redhat.com/security/cve/CVE-2017-7526 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526 https://eprint.iacr.org/2017/627 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=78130828e9a140a9de4dafadbc844dbb64cb709a https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=e6a3dc9900433bbc8ad362a595a3837318c28fa9 https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html https://ubuntu.com/security/notices/USN-3347-1 https://ubuntu.com/security/notices/USN-3347-2 https://ubuntu.com/security/notices/USN-3733-1 https://ubuntu.com/security/notices/USN-3733-2 https://usn.ubuntu.com/3733-1/ https://usn.ubuntu.com/3733-2/ https://www.debian.org/security/2017/dsa-3901 https://www.debian.org/security/2017/dsa-3960
|
libgcrypt11 |
CVE-2018-0495 |
LOW |
1.5.3-2ubuntu4.2 |
1.5.3-2ubuntu4.6 |
Expand...http://www.securitytracker.com/id/1041144 http://www.securitytracker.com/id/1041147 https://access.redhat.com/errata/RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1296 https://access.redhat.com/errata/RHSA-2019:1297 https://access.redhat.com/errata/RHSA-2019:1543 https://access.redhat.com/errata/RHSA-2019:2237 https://access.redhat.com/security/cve/CVE-2018-0495 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495 https://dev.gnupg.org/T4011 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.38_release_notes https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965 https://linux.oracle.com/cve/CVE-2018-0495.html https://linux.oracle.com/errata/ELSA-2019-2237.html https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html https://ubuntu.com/security/notices/USN-3689-1 https://ubuntu.com/security/notices/USN-3689-2 https://ubuntu.com/security/notices/USN-3692-1 https://ubuntu.com/security/notices/USN-3692-2 https://ubuntu.com/security/notices/USN-3850-1 https://ubuntu.com/security/notices/USN-3850-2 https://usn.ubuntu.com/3689-1/ https://usn.ubuntu.com/3689-2/ https://usn.ubuntu.com/3692-1/ https://usn.ubuntu.com/3692-2/ https://usn.ubuntu.com/3850-1/ https://usn.ubuntu.com/3850-2/ https://www.debian.org/security/2018/dsa-4231 https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
libgnutls-openssl27 |
CVE-2017-5335 |
MEDIUM |
2.12.23-12ubuntu2.4 |
2.12.23-12ubuntu2.6 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html http://rhn.redhat.com/errata/RHSA-2017-0574.html http://seclists.org/oss-sec/2017/q1/51 http://www.openwall.com/lists/oss-security/2017/01/10/7 http://www.openwall.com/lists/oss-security/2017/01/11/4 http://www.securityfocus.com/bid/95374 http://www.securitytracker.com/id/1037576 https://access.redhat.com/errata/RHSA-2017:2292 https://access.redhat.com/security/cve/CVE-2017-5335 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=337 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335 https://gitlab.com/gnutls/gnutls/commit/49be4f7b82eba2363bb8d4090950dad976a77a3a https://gnutls.org/security.html#GNUTLS-SA-2017-2 https://linux.oracle.com/cve/CVE-2017-5335.html https://linux.oracle.com/errata/ELSA-2017-2292.html https://security.gentoo.org/glsa/201702-04 https://ubuntu.com/security/notices/USN-3183-1
|
libgnutls-openssl27 |
CVE-2017-5336 |
MEDIUM |
2.12.23-12ubuntu2.4 |
2.12.23-12ubuntu2.6 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html http://rhn.redhat.com/errata/RHSA-2017-0574.html http://seclists.org/oss-sec/2017/q1/51 http://www.openwall.com/lists/oss-security/2017/01/10/7 http://www.openwall.com/lists/oss-security/2017/01/11/4 http://www.securityfocus.com/bid/95377 http://www.securitytracker.com/id/1037576 https://access.redhat.com/errata/RHSA-2017:2292 https://access.redhat.com/security/cve/CVE-2017-5336 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336 https://gitlab.com/gnutls/gnutls/commit/5140422e0d7319a8e2fe07f02cbcafc4d6538732 https://gnutls.org/security.html#GNUTLS-SA-2017-2 https://linux.oracle.com/cve/CVE-2017-5336.html https://linux.oracle.com/errata/ELSA-2017-2292.html https://security.gentoo.org/glsa/201702-04 https://ubuntu.com/security/notices/USN-3183-1
|
libgnutls-openssl27 |
CVE-2017-5337 |
MEDIUM |
2.12.23-12ubuntu2.4 |
2.12.23-12ubuntu2.6 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html http://rhn.redhat.com/errata/RHSA-2017-0574.html http://seclists.org/oss-sec/2017/q1/51 http://www.openwall.com/lists/oss-security/2017/01/10/7 http://www.openwall.com/lists/oss-security/2017/01/11/4 http://www.securityfocus.com/bid/95372 http://www.securitytracker.com/id/1037576 https://access.redhat.com/errata/RHSA-2017:2292 https://access.redhat.com/security/cve/CVE-2017-5337 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=338 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=346 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337 https://gitlab.com/gnutls/gnutls/commit/94fcf1645ea17223237aaf8d19132e004afddc1a https://gnutls.org/security.html#GNUTLS-SA-2017-2 https://linux.oracle.com/cve/CVE-2017-5337.html https://linux.oracle.com/errata/ELSA-2017-2292.html https://security.gentoo.org/glsa/201702-04 https://ubuntu.com/security/notices/USN-3183-1
|
libgnutls-openssl27 |
CVE-2016-8610 |
LOW |
2.12.23-12ubuntu2.4 |
2.12.23-12ubuntu2.6 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-0286.html http://rhn.redhat.com/errata/RHSA-2017-0574.html http://rhn.redhat.com/errata/RHSA-2017-1415.html http://rhn.redhat.com/errata/RHSA-2017-1659.html http://seclists.org/oss-sec/2016/q4/224 http://security.360.cn/cve/CVE-2016-8610 http://security.360.cn/cve/CVE-2016-8610/ http://www.openwall.com/lists/oss-security/2016/10/24/3 http://www.securityfocus.com/bid/93841 http://www.securitytracker.com/id/1037084 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/errata/RHSA-2017:1801 https://access.redhat.com/errata/RHSA-2017:1802 https://access.redhat.com/errata/RHSA-2017:2493 https://access.redhat.com/errata/RHSA-2017:2494 https://access.redhat.com/security/cve/CVE-2016-8610 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610 https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401 https://linux.oracle.com/cve/CVE-2016-8610.html https://linux.oracle.com/errata/ELSA-2017-0574.html https://security.360.cn/cve/CVE-2016-8610/ https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc https://security.netapp.com/advisory/ntap-20171130-0001/ https://security.paloaltonetworks.com/CVE-2016-8610 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us https://ubuntu.com/security/notices/USN-3181-1 https://ubuntu.com/security/notices/USN-3183-1 https://ubuntu.com/security/notices/USN-3183-2 https://www.debian.org/security/2017/dsa-3773 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
libgnutls-openssl27 |
CVE-2017-7869 |
LOW |
2.12.23-12ubuntu2.4 |
2.12.23-12ubuntu2.8 |
Expand...http://www.securityfocus.com/bid/97040 https://access.redhat.com/errata/RHSA-2017:2292 https://access.redhat.com/security/cve/CVE-2017-7869 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869 https://gitlab.com/gnutls/gnutls/commit/51464af713d71802e3c6d5ac15f1a95132a354fe https://gnutls.org/security.html#GNUTLS-SA-2017-3 https://linux.oracle.com/cve/CVE-2017-7869.html https://linux.oracle.com/errata/ELSA-2017-2292.html https://ubuntu.com/security/notices/USN-3318-1 https://www.gnutls.org/security.html https://www.gnutls.org/security.html#GNUTLS-SA-2017-3
|
libgnutls26 |
CVE-2017-5335 |
MEDIUM |
2.12.23-12ubuntu2.4 |
2.12.23-12ubuntu2.6 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html http://rhn.redhat.com/errata/RHSA-2017-0574.html http://seclists.org/oss-sec/2017/q1/51 http://www.openwall.com/lists/oss-security/2017/01/10/7 http://www.openwall.com/lists/oss-security/2017/01/11/4 http://www.securityfocus.com/bid/95374 http://www.securitytracker.com/id/1037576 https://access.redhat.com/errata/RHSA-2017:2292 https://access.redhat.com/security/cve/CVE-2017-5335 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=337 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335 https://gitlab.com/gnutls/gnutls/commit/49be4f7b82eba2363bb8d4090950dad976a77a3a https://gnutls.org/security.html#GNUTLS-SA-2017-2 https://linux.oracle.com/cve/CVE-2017-5335.html https://linux.oracle.com/errata/ELSA-2017-2292.html https://security.gentoo.org/glsa/201702-04 https://ubuntu.com/security/notices/USN-3183-1
|
libgnutls26 |
CVE-2017-5336 |
MEDIUM |
2.12.23-12ubuntu2.4 |
2.12.23-12ubuntu2.6 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html http://rhn.redhat.com/errata/RHSA-2017-0574.html http://seclists.org/oss-sec/2017/q1/51 http://www.openwall.com/lists/oss-security/2017/01/10/7 http://www.openwall.com/lists/oss-security/2017/01/11/4 http://www.securityfocus.com/bid/95377 http://www.securitytracker.com/id/1037576 https://access.redhat.com/errata/RHSA-2017:2292 https://access.redhat.com/security/cve/CVE-2017-5336 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336 https://gitlab.com/gnutls/gnutls/commit/5140422e0d7319a8e2fe07f02cbcafc4d6538732 https://gnutls.org/security.html#GNUTLS-SA-2017-2 https://linux.oracle.com/cve/CVE-2017-5336.html https://linux.oracle.com/errata/ELSA-2017-2292.html https://security.gentoo.org/glsa/201702-04 https://ubuntu.com/security/notices/USN-3183-1
|
libgnutls26 |
CVE-2017-5337 |
MEDIUM |
2.12.23-12ubuntu2.4 |
2.12.23-12ubuntu2.6 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html http://rhn.redhat.com/errata/RHSA-2017-0574.html http://seclists.org/oss-sec/2017/q1/51 http://www.openwall.com/lists/oss-security/2017/01/10/7 http://www.openwall.com/lists/oss-security/2017/01/11/4 http://www.securityfocus.com/bid/95372 http://www.securitytracker.com/id/1037576 https://access.redhat.com/errata/RHSA-2017:2292 https://access.redhat.com/security/cve/CVE-2017-5337 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=338 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=346 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337 https://gitlab.com/gnutls/gnutls/commit/94fcf1645ea17223237aaf8d19132e004afddc1a https://gnutls.org/security.html#GNUTLS-SA-2017-2 https://linux.oracle.com/cve/CVE-2017-5337.html https://linux.oracle.com/errata/ELSA-2017-2292.html https://security.gentoo.org/glsa/201702-04 https://ubuntu.com/security/notices/USN-3183-1
|
libgnutls26 |
CVE-2016-8610 |
LOW |
2.12.23-12ubuntu2.4 |
2.12.23-12ubuntu2.6 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-0286.html http://rhn.redhat.com/errata/RHSA-2017-0574.html http://rhn.redhat.com/errata/RHSA-2017-1415.html http://rhn.redhat.com/errata/RHSA-2017-1659.html http://seclists.org/oss-sec/2016/q4/224 http://security.360.cn/cve/CVE-2016-8610 http://security.360.cn/cve/CVE-2016-8610/ http://www.openwall.com/lists/oss-security/2016/10/24/3 http://www.securityfocus.com/bid/93841 http://www.securitytracker.com/id/1037084 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/errata/RHSA-2017:1801 https://access.redhat.com/errata/RHSA-2017:1802 https://access.redhat.com/errata/RHSA-2017:2493 https://access.redhat.com/errata/RHSA-2017:2494 https://access.redhat.com/security/cve/CVE-2016-8610 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610 https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401 https://linux.oracle.com/cve/CVE-2016-8610.html https://linux.oracle.com/errata/ELSA-2017-0574.html https://security.360.cn/cve/CVE-2016-8610/ https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc https://security.netapp.com/advisory/ntap-20171130-0001/ https://security.paloaltonetworks.com/CVE-2016-8610 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us https://ubuntu.com/security/notices/USN-3181-1 https://ubuntu.com/security/notices/USN-3183-1 https://ubuntu.com/security/notices/USN-3183-2 https://www.debian.org/security/2017/dsa-3773 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
libgnutls26 |
CVE-2017-7869 |
LOW |
2.12.23-12ubuntu2.4 |
2.12.23-12ubuntu2.8 |
Expand...http://www.securityfocus.com/bid/97040 https://access.redhat.com/errata/RHSA-2017:2292 https://access.redhat.com/security/cve/CVE-2017-7869 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869 https://gitlab.com/gnutls/gnutls/commit/51464af713d71802e3c6d5ac15f1a95132a354fe https://gnutls.org/security.html#GNUTLS-SA-2017-3 https://linux.oracle.com/cve/CVE-2017-7869.html https://linux.oracle.com/errata/ELSA-2017-2292.html https://ubuntu.com/security/notices/USN-3318-1 https://www.gnutls.org/security.html https://www.gnutls.org/security.html#GNUTLS-SA-2017-3
|
libgssapi-krb5-2 |
CVE-2015-8629 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0493.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/82801 http://www.securitytracker.com/id/1034914 https://access.redhat.com/security/cve/CVE-2015-8629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629 https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb https://linux.oracle.com/cve/CVE-2015-8629.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
libgssapi-krb5-2 |
CVE-2015-8630 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securitytracker.com/id/1034915 https://access.redhat.com/security/cve/CVE-2015-8630 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630 https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b https://linux.oracle.com/cve/CVE-2015-8630.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
libgssapi-krb5-2 |
CVE-2015-8631 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0493.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securitytracker.com/id/1034916 https://access.redhat.com/security/cve/CVE-2015-8631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631 https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2 https://linux.oracle.com/cve/CVE-2015-8631.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
libgssapi-krb5-2 |
CVE-2016-3119 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html http://rhn.redhat.com/errata/RHSA-2016-2591.html http://www.securityfocus.com/bid/85392 http://www.securitytracker.com/id/1035399 https://access.redhat.com/security/cve/CVE-2016-3119 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119 https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99 https://linux.oracle.com/cve/CVE-2016-3119.html https://linux.oracle.com/errata/ELSA-2016-2591.html https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
|
libgssapi-krb5-2 |
CVE-2016-3120 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458 http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html http://rhn.redhat.com/errata/RHSA-2016-2591.html http://web.mit.edu/kerberos/krb5-1.13/ http://web.mit.edu/kerberos/krb5-1.14/ http://www.securityfocus.com/bid/92132 http://www.securitytracker.com/id/1036442 https://access.redhat.com/security/cve/CVE-2016-3120 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120 https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7 https://linux.oracle.com/cve/CVE-2016-3120.html https://linux.oracle.com/errata/ELSA-2016-2591.html https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
|
libgssapi-krb5-2 |
CVE-2017-11368 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securityfocus.com/bid/100291 https://access.redhat.com/errata/RHSA-2018:0666 https://access.redhat.com/security/cve/CVE-2017-11368 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368 https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970 https://github.com/krb5/krb5/pull/678/files https://linux.oracle.com/cve/CVE-2017-11368.html https://linux.oracle.com/errata/ELSA-2018-0666.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HNWXM6OQU7G23MG7XWIOBRGP43ECLDT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBUTXMNZWMVJLQ4NDX5OQFPUVCJRLV3W/
|
libgssapi-krb5-2 |
CVE-2017-11462 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598 https://access.redhat.com/security/cve/CVE-2017-11462 https://bugzilla.redhat.com/show_bug.cgi?id=1488873 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462 https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
|
libgssapi-krb5-2 |
CVE-2018-5729 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securitytracker.com/id/1042071 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3071 https://access.redhat.com/security/cve/CVE-2018-5729 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869 https://bugzilla.redhat.com/show_bug.cgi?id=1551083 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729 https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1 https://linux.oracle.com/cve/CVE-2018-5729.html https://linux.oracle.com/errata/ELSA-2018-3071.html https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
|
libgssapi-krb5-2 |
CVE-2018-5730 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securitytracker.com/id/1042071 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3071 https://access.redhat.com/security/cve/CVE-2018-5730 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869 https://bugzilla.redhat.com/show_bug.cgi?id=1551082 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730 https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1 https://linux.oracle.com/cve/CVE-2018-5730.html https://linux.oracle.com/errata/ELSA-2018-3071.html https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
|
libgssapi3-heimdal |
CVE-2017-11103 |
MEDIUM |
1.6~git20131207+dfsg-1ubuntu1.1 |
1.6~git20131207+dfsg-1ubuntu1.2 |
Expand...http://www.debian.org/security/2017/dsa-3912 http://www.h5l.org/advisories.html?show=2017-07-11 http://www.securityfocus.com/bid/99551 http://www.securitytracker.com/id/1038876 http://www.securitytracker.com/id/1039427 https://access.redhat.com/security/cve/CVE-2017-11103 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103 https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0 https://orpheus-lyre.info/ https://support.apple.com/HT208112 https://support.apple.com/HT208144 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3353-1 https://ubuntu.com/security/notices/USN-3353-2 https://ubuntu.com/security/notices/USN-3353-3 https://ubuntu.com/security/notices/USN-3353-4 https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc https://www.orpheus-lyre.info/ https://www.samba.org/samba/security/CVE-2017-11103.html
|
libhcrypto4-heimdal |
CVE-2017-11103 |
MEDIUM |
1.6~git20131207+dfsg-1ubuntu1.1 |
1.6~git20131207+dfsg-1ubuntu1.2 |
Expand...http://www.debian.org/security/2017/dsa-3912 http://www.h5l.org/advisories.html?show=2017-07-11 http://www.securityfocus.com/bid/99551 http://www.securitytracker.com/id/1038876 http://www.securitytracker.com/id/1039427 https://access.redhat.com/security/cve/CVE-2017-11103 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103 https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0 https://orpheus-lyre.info/ https://support.apple.com/HT208112 https://support.apple.com/HT208144 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3353-1 https://ubuntu.com/security/notices/USN-3353-2 https://ubuntu.com/security/notices/USN-3353-3 https://ubuntu.com/security/notices/USN-3353-4 https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc https://www.orpheus-lyre.info/ https://www.samba.org/samba/security/CVE-2017-11103.html
|
libheimbase1-heimdal |
CVE-2017-11103 |
MEDIUM |
1.6~git20131207+dfsg-1ubuntu1.1 |
1.6~git20131207+dfsg-1ubuntu1.2 |
Expand...http://www.debian.org/security/2017/dsa-3912 http://www.h5l.org/advisories.html?show=2017-07-11 http://www.securityfocus.com/bid/99551 http://www.securitytracker.com/id/1038876 http://www.securitytracker.com/id/1039427 https://access.redhat.com/security/cve/CVE-2017-11103 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103 https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0 https://orpheus-lyre.info/ https://support.apple.com/HT208112 https://support.apple.com/HT208144 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3353-1 https://ubuntu.com/security/notices/USN-3353-2 https://ubuntu.com/security/notices/USN-3353-3 https://ubuntu.com/security/notices/USN-3353-4 https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc https://www.orpheus-lyre.info/ https://www.samba.org/samba/security/CVE-2017-11103.html
|
libheimntlm0-heimdal |
CVE-2017-11103 |
MEDIUM |
1.6~git20131207+dfsg-1ubuntu1.1 |
1.6~git20131207+dfsg-1ubuntu1.2 |
Expand...http://www.debian.org/security/2017/dsa-3912 http://www.h5l.org/advisories.html?show=2017-07-11 http://www.securityfocus.com/bid/99551 http://www.securitytracker.com/id/1038876 http://www.securitytracker.com/id/1039427 https://access.redhat.com/security/cve/CVE-2017-11103 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103 https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0 https://orpheus-lyre.info/ https://support.apple.com/HT208112 https://support.apple.com/HT208144 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3353-1 https://ubuntu.com/security/notices/USN-3353-2 https://ubuntu.com/security/notices/USN-3353-3 https://ubuntu.com/security/notices/USN-3353-4 https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc https://www.orpheus-lyre.info/ https://www.samba.org/samba/security/CVE-2017-11103.html
|
libhx509-5-heimdal |
CVE-2017-11103 |
MEDIUM |
1.6~git20131207+dfsg-1ubuntu1.1 |
1.6~git20131207+dfsg-1ubuntu1.2 |
Expand...http://www.debian.org/security/2017/dsa-3912 http://www.h5l.org/advisories.html?show=2017-07-11 http://www.securityfocus.com/bid/99551 http://www.securitytracker.com/id/1038876 http://www.securitytracker.com/id/1039427 https://access.redhat.com/security/cve/CVE-2017-11103 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103 https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0 https://orpheus-lyre.info/ https://support.apple.com/HT208112 https://support.apple.com/HT208144 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3353-1 https://ubuntu.com/security/notices/USN-3353-2 https://ubuntu.com/security/notices/USN-3353-3 https://ubuntu.com/security/notices/USN-3353-4 https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc https://www.orpheus-lyre.info/ https://www.samba.org/samba/security/CVE-2017-11103.html
|
libidn11 |
CVE-2016-6261 |
MEDIUM |
1.28-1ubuntu2 |
1.28-1ubuntu2.1 |
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html http://www.debian.org/security/2016/dsa-3658 http://www.openwall.com/lists/oss-security/2016/07/20/6 http://www.openwall.com/lists/oss-security/2016/07/21/4 http://www.securityfocus.com/bid/92070 http://www.ubuntu.com/usn/USN-3068-1 https://access.redhat.com/security/cve/CVE-2016-6261 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00016.html https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html https://ubuntu.com/security/notices/USN-3068-1
|
libidn11 |
CVE-2016-6262 |
MEDIUM |
1.28-1ubuntu2 |
1.28-1ubuntu2.1 |
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60 http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html http://www.openwall.com/lists/oss-security/2016/07/20/6 http://www.openwall.com/lists/oss-security/2016/07/21/4 http://www.securityfocus.com/bid/92070 http://www.ubuntu.com/usn/USN-3068-1 https://access.redhat.com/security/cve/CVE-2016-6262 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html https://ubuntu.com/security/notices/USN-3068-1
|
libidn11 |
CVE-2016-6263 |
MEDIUM |
1.28-1ubuntu2 |
1.28-1ubuntu2.1 |
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555 http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html http://www.debian.org/security/2016/dsa-3658 http://www.openwall.com/lists/oss-security/2016/07/20/6 http://www.openwall.com/lists/oss-security/2016/07/21/4 http://www.securityfocus.com/bid/92070 http://www.ubuntu.com/usn/USN-3068-1 https://access.redhat.com/security/cve/CVE-2016-6263 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html https://security.gentoo.org/glsa/201908-06 https://ubuntu.com/security/notices/USN-3068-1
|
libidn11 |
CVE-2017-14062 |
MEDIUM |
1.28-1ubuntu2 |
1.28-1ubuntu2.2 |
Expand...http://www.debian.org/security/2017/dsa-3988 https://access.redhat.com/security/cve/CVE-2017-14062 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14062 https://gitlab.com/libidn/libidn2/blob/master/NEWS https://gitlab.com/libidn/libidn2/commit/3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd https://lists.debian.org/debian-lts-announce/2018/07/msg00040.html https://ubuntu.com/security/notices/USN-3421-1 https://ubuntu.com/security/notices/USN-3434-1 https://ubuntu.com/security/notices/USN-3434-2
|
libidn11 |
CVE-2015-2059 |
LOW |
1.28-1ubuntu2 |
1.28-1ubuntu2.1 |
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279 http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html http://www.debian.org/security/2016/dsa-3578 http://www.openwall.com/lists/oss-security/2015/02/23/25 http://www.securityfocus.com/bid/72736 http://www.ubuntu.com/usn/USN-3068-1 https://access.redhat.com/security/cve/CVE-2015-2059 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2059 https://github.com/jabberd2/jabberd2/issues/85 https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00026.html (regression) https://ubuntu.com/security/notices/USN-3068-1
|
libidn11 |
CVE-2015-8948 |
LOW |
1.28-1ubuntu2 |
1.28-1ubuntu2.1 |
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041 http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html http://www.debian.org/security/2016/dsa-3658 http://www.openwall.com/lists/oss-security/2016/07/20/6 http://www.openwall.com/lists/oss-security/2016/07/21/4 http://www.securityfocus.com/bid/92070 http://www.ubuntu.com/usn/USN-3068-1 https://access.redhat.com/security/cve/CVE-2015-8948 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html https://marc.info/?l=oss-security&m=146910769415616&w=2 https://ubuntu.com/security/notices/USN-3068-1
|
libk5crypto3 |
CVE-2015-8629 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0493.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/82801 http://www.securitytracker.com/id/1034914 https://access.redhat.com/security/cve/CVE-2015-8629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629 https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb https://linux.oracle.com/cve/CVE-2015-8629.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
libk5crypto3 |
CVE-2015-8630 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securitytracker.com/id/1034915 https://access.redhat.com/security/cve/CVE-2015-8630 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630 https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b https://linux.oracle.com/cve/CVE-2015-8630.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
libk5crypto3 |
CVE-2015-8631 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0493.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securitytracker.com/id/1034916 https://access.redhat.com/security/cve/CVE-2015-8631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631 https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2 https://linux.oracle.com/cve/CVE-2015-8631.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
libk5crypto3 |
CVE-2016-3119 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html http://rhn.redhat.com/errata/RHSA-2016-2591.html http://www.securityfocus.com/bid/85392 http://www.securitytracker.com/id/1035399 https://access.redhat.com/security/cve/CVE-2016-3119 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119 https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99 https://linux.oracle.com/cve/CVE-2016-3119.html https://linux.oracle.com/errata/ELSA-2016-2591.html https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
|
libk5crypto3 |
CVE-2016-3120 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458 http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html http://rhn.redhat.com/errata/RHSA-2016-2591.html http://web.mit.edu/kerberos/krb5-1.13/ http://web.mit.edu/kerberos/krb5-1.14/ http://www.securityfocus.com/bid/92132 http://www.securitytracker.com/id/1036442 https://access.redhat.com/security/cve/CVE-2016-3120 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120 https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7 https://linux.oracle.com/cve/CVE-2016-3120.html https://linux.oracle.com/errata/ELSA-2016-2591.html https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
|
libk5crypto3 |
CVE-2017-11368 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securityfocus.com/bid/100291 https://access.redhat.com/errata/RHSA-2018:0666 https://access.redhat.com/security/cve/CVE-2017-11368 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368 https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970 https://github.com/krb5/krb5/pull/678/files https://linux.oracle.com/cve/CVE-2017-11368.html https://linux.oracle.com/errata/ELSA-2018-0666.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HNWXM6OQU7G23MG7XWIOBRGP43ECLDT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBUTXMNZWMVJLQ4NDX5OQFPUVCJRLV3W/
|
libk5crypto3 |
CVE-2017-11462 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598 https://access.redhat.com/security/cve/CVE-2017-11462 https://bugzilla.redhat.com/show_bug.cgi?id=1488873 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462 https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
|
libk5crypto3 |
CVE-2018-5729 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securitytracker.com/id/1042071 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3071 https://access.redhat.com/security/cve/CVE-2018-5729 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869 https://bugzilla.redhat.com/show_bug.cgi?id=1551083 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729 https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1 https://linux.oracle.com/cve/CVE-2018-5729.html https://linux.oracle.com/errata/ELSA-2018-3071.html https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
|
libk5crypto3 |
CVE-2018-5730 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securitytracker.com/id/1042071 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3071 https://access.redhat.com/security/cve/CVE-2018-5730 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869 https://bugzilla.redhat.com/show_bug.cgi?id=1551082 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730 https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1 https://linux.oracle.com/cve/CVE-2018-5730.html https://linux.oracle.com/errata/ELSA-2018-3071.html https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
|
libkrb5-26-heimdal |
CVE-2017-11103 |
MEDIUM |
1.6~git20131207+dfsg-1ubuntu1.1 |
1.6~git20131207+dfsg-1ubuntu1.2 |
Expand...http://www.debian.org/security/2017/dsa-3912 http://www.h5l.org/advisories.html?show=2017-07-11 http://www.securityfocus.com/bid/99551 http://www.securitytracker.com/id/1038876 http://www.securitytracker.com/id/1039427 https://access.redhat.com/security/cve/CVE-2017-11103 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103 https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0 https://orpheus-lyre.info/ https://support.apple.com/HT208112 https://support.apple.com/HT208144 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3353-1 https://ubuntu.com/security/notices/USN-3353-2 https://ubuntu.com/security/notices/USN-3353-3 https://ubuntu.com/security/notices/USN-3353-4 https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc https://www.orpheus-lyre.info/ https://www.samba.org/samba/security/CVE-2017-11103.html
|
libkrb5-3 |
CVE-2015-8629 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0493.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/82801 http://www.securitytracker.com/id/1034914 https://access.redhat.com/security/cve/CVE-2015-8629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629 https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb https://linux.oracle.com/cve/CVE-2015-8629.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
libkrb5-3 |
CVE-2015-8630 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securitytracker.com/id/1034915 https://access.redhat.com/security/cve/CVE-2015-8630 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630 https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b https://linux.oracle.com/cve/CVE-2015-8630.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
libkrb5-3 |
CVE-2015-8631 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0493.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securitytracker.com/id/1034916 https://access.redhat.com/security/cve/CVE-2015-8631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631 https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2 https://linux.oracle.com/cve/CVE-2015-8631.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
libkrb5-3 |
CVE-2016-3119 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html http://rhn.redhat.com/errata/RHSA-2016-2591.html http://www.securityfocus.com/bid/85392 http://www.securitytracker.com/id/1035399 https://access.redhat.com/security/cve/CVE-2016-3119 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119 https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99 https://linux.oracle.com/cve/CVE-2016-3119.html https://linux.oracle.com/errata/ELSA-2016-2591.html https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
|
libkrb5-3 |
CVE-2016-3120 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458 http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html http://rhn.redhat.com/errata/RHSA-2016-2591.html http://web.mit.edu/kerberos/krb5-1.13/ http://web.mit.edu/kerberos/krb5-1.14/ http://www.securityfocus.com/bid/92132 http://www.securitytracker.com/id/1036442 https://access.redhat.com/security/cve/CVE-2016-3120 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120 https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7 https://linux.oracle.com/cve/CVE-2016-3120.html https://linux.oracle.com/errata/ELSA-2016-2591.html https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
|
libkrb5-3 |
CVE-2017-11368 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securityfocus.com/bid/100291 https://access.redhat.com/errata/RHSA-2018:0666 https://access.redhat.com/security/cve/CVE-2017-11368 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368 https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970 https://github.com/krb5/krb5/pull/678/files https://linux.oracle.com/cve/CVE-2017-11368.html https://linux.oracle.com/errata/ELSA-2018-0666.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HNWXM6OQU7G23MG7XWIOBRGP43ECLDT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBUTXMNZWMVJLQ4NDX5OQFPUVCJRLV3W/
|
libkrb5-3 |
CVE-2017-11462 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598 https://access.redhat.com/security/cve/CVE-2017-11462 https://bugzilla.redhat.com/show_bug.cgi?id=1488873 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462 https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
|
libkrb5-3 |
CVE-2018-5729 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securitytracker.com/id/1042071 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3071 https://access.redhat.com/security/cve/CVE-2018-5729 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869 https://bugzilla.redhat.com/show_bug.cgi?id=1551083 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729 https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1 https://linux.oracle.com/cve/CVE-2018-5729.html https://linux.oracle.com/errata/ELSA-2018-3071.html https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
|
libkrb5-3 |
CVE-2018-5730 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securitytracker.com/id/1042071 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3071 https://access.redhat.com/security/cve/CVE-2018-5730 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869 https://bugzilla.redhat.com/show_bug.cgi?id=1551082 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730 https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1 https://linux.oracle.com/cve/CVE-2018-5730.html https://linux.oracle.com/errata/ELSA-2018-3071.html https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
|
libkrb5support0 |
CVE-2015-8629 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0493.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/82801 http://www.securitytracker.com/id/1034914 https://access.redhat.com/security/cve/CVE-2015-8629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629 https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb https://linux.oracle.com/cve/CVE-2015-8629.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
libkrb5support0 |
CVE-2015-8630 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securitytracker.com/id/1034915 https://access.redhat.com/security/cve/CVE-2015-8630 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630 https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b https://linux.oracle.com/cve/CVE-2015-8630.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
libkrb5support0 |
CVE-2015-8631 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343 http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html http://rhn.redhat.com/errata/RHSA-2016-0493.html http://rhn.redhat.com/errata/RHSA-2016-0532.html http://www.debian.org/security/2016/dsa-3466 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securitytracker.com/id/1034916 https://access.redhat.com/security/cve/CVE-2015-8631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631 https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2 https://linux.oracle.com/cve/CVE-2015-8631.html https://linux.oracle.com/errata/ELSA-2016-0532.html
|
libkrb5support0 |
CVE-2016-3119 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html http://rhn.redhat.com/errata/RHSA-2016-2591.html http://www.securityfocus.com/bid/85392 http://www.securitytracker.com/id/1035399 https://access.redhat.com/security/cve/CVE-2016-3119 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119 https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99 https://linux.oracle.com/cve/CVE-2016-3119.html https://linux.oracle.com/errata/ELSA-2016-2591.html https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
|
libkrb5support0 |
CVE-2016-3120 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458 http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html http://rhn.redhat.com/errata/RHSA-2016-2591.html http://web.mit.edu/kerberos/krb5-1.13/ http://web.mit.edu/kerberos/krb5-1.14/ http://www.securityfocus.com/bid/92132 http://www.securitytracker.com/id/1036442 https://access.redhat.com/security/cve/CVE-2016-3120 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120 https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7 https://linux.oracle.com/cve/CVE-2016-3120.html https://linux.oracle.com/errata/ELSA-2016-2591.html https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
|
libkrb5support0 |
CVE-2017-11368 |
MEDIUM |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securityfocus.com/bid/100291 https://access.redhat.com/errata/RHSA-2018:0666 https://access.redhat.com/security/cve/CVE-2017-11368 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368 https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970 https://github.com/krb5/krb5/pull/678/files https://linux.oracle.com/cve/CVE-2017-11368.html https://linux.oracle.com/errata/ELSA-2018-0666.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HNWXM6OQU7G23MG7XWIOBRGP43ECLDT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBUTXMNZWMVJLQ4NDX5OQFPUVCJRLV3W/
|
libkrb5support0 |
CVE-2017-11462 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598 https://access.redhat.com/security/cve/CVE-2017-11462 https://bugzilla.redhat.com/show_bug.cgi?id=1488873 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462 https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
|
libkrb5support0 |
CVE-2018-5729 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securitytracker.com/id/1042071 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3071 https://access.redhat.com/security/cve/CVE-2018-5729 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869 https://bugzilla.redhat.com/show_bug.cgi?id=1551083 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729 https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1 https://linux.oracle.com/cve/CVE-2018-5729.html https://linux.oracle.com/errata/ELSA-2018-3071.html https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
|
libkrb5support0 |
CVE-2018-5730 |
LOW |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
Expand...http://www.securitytracker.com/id/1042071 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3071 https://access.redhat.com/security/cve/CVE-2018-5730 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869 https://bugzilla.redhat.com/show_bug.cgi?id=1551082 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730 https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1 https://linux.oracle.com/cve/CVE-2018-5730.html https://linux.oracle.com/errata/ELSA-2018-3071.html https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
|
libldap-2.4-2 |
CVE-2017-9287 |
MEDIUM |
2.4.31-1+nmu2ubuntu8.2 |
2.4.31-1+nmu2ubuntu8.4 |
Expand...http://www.debian.org/security/2017/dsa-3868 http://www.openldap.org/its/?findid=8655 http://www.securityfocus.com/bid/98736 http://www.securitytracker.com/id/1038591 https://access.redhat.com/errata/RHSA-2017:1852 https://access.redhat.com/security/cve/CVE-2017-9287 https://bugs.debian.org/863563 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9287 https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://linux.oracle.com/cve/CVE-2017-9287.html https://linux.oracle.com/errata/ELSA-2017-1852.html https://ubuntu.com/security/notices/USN-3307-1 https://ubuntu.com/security/notices/USN-3307-2 https://www.oracle.com/security-alerts/cpuapr2022.html
|
libmagic1 |
CVE-2014-9620 |
LOW |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
Expand...http://advisories.mageia.org/MGASA-2015-0040.html http://mx.gw.com/pipermail/file/2014/001653.html http://mx.gw.com/pipermail/file/2015/001660.html http://rhn.redhat.com/errata/RHSA-2016-0760.html http://www.debian.org/security/2015/dsa-3121 http://www.openwall.com/lists/oss-security/2015/01/17/9 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/71715 https://access.redhat.com/security/cve/CVE-2014-9620 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620 https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4 https://linux.oracle.com/cve/CVE-2014-9620.html https://linux.oracle.com/errata/ELSA-2016-0760.html https://security.gentoo.org/glsa/201503-08 https://ubuntu.com/security/notices/USN-3686-1 https://usn.ubuntu.com/3686-1/
|
libmagic1 |
CVE-2014-9621 |
LOW |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
Expand...http://advisories.mageia.org/MGASA-2015-0040.html http://mx.gw.com/pipermail/file/2014/001654.html http://mx.gw.com/pipermail/file/2015/001660.html http://www.openwall.com/lists/oss-security/2015/01/17/9 https://access.redhat.com/security/cve/CVE-2014-9621 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9621 https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c https://security.gentoo.org/glsa/201503-08 https://ubuntu.com/security/notices/USN-3686-1 https://usn.ubuntu.com/3686-1/
|
libmagic1 |
CVE-2014-9653 |
LOW |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
Expand...http://bugs.gw.com/view.php?id=409 http://marc.info/?l=bugtraq&m=143748090628601&w=2 http://marc.info/?l=bugtraq&m=144050155601375&w=2 http://mx.gw.com/pipermail/file/2014/001649.html http://openwall.com/lists/oss-security/2015/02/05/13 http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-0760.html http://www.debian.org/security/2015/dsa-3196 http://www.openwall.com/lists/oss-security/2015/02/04/13 http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securityfocus.com/bid/72516 https://access.redhat.com/security/cve/CVE-2014-9653 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9653 https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f https://linux.oracle.com/cve/CVE-2014-9653.html https://linux.oracle.com/errata/ELSA-2016-0760.html https://security.gentoo.org/glsa/201701-42 https://ubuntu.com/security/notices/USN-3686-1 https://usn.ubuntu.com/3686-1/
|
libmagic1 |
CVE-2015-8865 |
LOW |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
Expand...http://bugs.gw.com/view.php?id=522 http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85802 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8865 https://bugs.php.net/bug.php?id=71527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865 https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://security.gentoo.org/glsa/201701-42 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://ubuntu.com/security/notices/USN-3686-1 https://ubuntu.com/security/notices/USN-3686-2 https://usn.ubuntu.com/3686-1/ https://usn.ubuntu.com/3686-2/
|
libmagic1 |
CVE-2018-10360 |
LOW |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html https://access.redhat.com/security/cve/CVE-2018-10360 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10360 https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22 https://linux.oracle.com/cve/CVE-2018-10360.html https://linux.oracle.com/errata/ELSA-2020-1022.html https://security.gentoo.org/glsa/201806-08 https://ubuntu.com/security/notices/USN-3686-1 https://ubuntu.com/security/notices/USN-3686-2 https://usn.ubuntu.com/3686-1/ https://usn.ubuntu.com/3686-2/
|
libmysqlclient18 |
CVE-2016-0640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86427 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640 https://linux.oracle.com/cve/CVE-2016-0640.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
libmysqlclient18 |
CVE-2016-0641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86470 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641 https://linux.oracle.com/cve/CVE-2016-0641.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
libmysqlclient18 |
CVE-2016-0642 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3557 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86445 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0642 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642 https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
libmysqlclient18 |
CVE-2016-0643 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86486 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0643 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643 https://linux.oracle.com/cve/CVE-2016-0643.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
libmysqlclient18 |
CVE-2016-0644 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86442 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0644 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644 https://linux.oracle.com/cve/CVE-2016-0644.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
libmysqlclient18 |
CVE-2016-0646 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86436 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0646 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646 https://linux.oracle.com/cve/CVE-2016-0646.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
libmysqlclient18 |
CVE-2016-0647 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86495 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647 https://linux.oracle.com/cve/CVE-2016-0647.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
libmysqlclient18 |
CVE-2016-0648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86457 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648 https://linux.oracle.com/cve/CVE-2016-0648.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
libmysqlclient18 |
CVE-2016-0649 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86498 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0649 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649 https://linux.oracle.com/cve/CVE-2016-0649.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
libmysqlclient18 |
CVE-2016-0650 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86496 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0650 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650 https://linux.oracle.com/cve/CVE-2016-0650.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
libmysqlclient18 |
CVE-2016-0666 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86509 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666 https://linux.oracle.com/cve/CVE-2016-0666.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
libmysqlclient18 |
CVE-2016-2047 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://marc.info/?l=oss-security&m=145379584107459&w=2 http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3453 http://www.debian.org/security/2016/dsa-3557 http://www.openwall.com/lists/oss-security/2016/01/26/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/81810 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-2047 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047 https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41 https://linux.oracle.com/cve/CVE-2016-2047.html https://linux.oracle.com/errata/ELSA-2016-0534.html https://mariadb.atlassian.net/browse/MDEV-9212 https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/ https://mariadb.com/kb/en/mdb-10023-rn/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
libmysqlclient18 |
CVE-2016-3477 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91902 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477 https://linux.oracle.com/cve/CVE-2016-3477.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
libmysqlclient18 |
CVE-2016-3492 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93650 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-3492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492 https://linux.oracle.com/cve/CVE-2016-3492.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
libmysqlclient18 |
CVE-2016-3521 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91932 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3521 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521 https://linux.oracle.com/cve/CVE-2016-3521.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
libmysqlclient18 |
CVE-2016-3615 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91960 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615 https://linux.oracle.com/cve/CVE-2016-3615.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
libmysqlclient18 |
CVE-2016-5440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91953 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-5440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440 https://linux.oracle.com/cve/CVE-2016-5440.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
libmysqlclient18 |
CVE-2016-5584 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93735 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5584 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3109-1
|
libmysqlclient18 |
CVE-2016-5612 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93630 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5612 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612 https://linux.oracle.com/cve/CVE-2016-5612.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://security.gentoo.org/glsa/201701-01
|
libmysqlclient18 |
CVE-2016-5624 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93635 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624 https://linux.oracle.com/cve/CVE-2016-5624.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
|
libmysqlclient18 |
CVE-2016-5626 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93638 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5626 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626 https://linux.oracle.com/cve/CVE-2016-5626.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
libmysqlclient18 |
CVE-2016-5629 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93668 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629 https://linux.oracle.com/cve/CVE-2016-5629.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
libmysqlclient18 |
CVE-2016-6662 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html http://rhn.redhat.com/errata/RHSA-2016-2058.html http://rhn.redhat.com/errata/RHSA-2016-2059.html http://rhn.redhat.com/errata/RHSA-2016-2060.html http://rhn.redhat.com/errata/RHSA-2016-2061.html http://rhn.redhat.com/errata/RHSA-2016-2062.html http://rhn.redhat.com/errata/RHSA-2016-2077.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Sep/23 http://www.debian.org/security/2016/dsa-3666 http://www.openwall.com/lists/oss-security/2016/09/12/3 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92912 http://www.securitytracker.com/id/1036769 https://access.redhat.com/security/cve/CVE-2016-6662 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662 https://jira.mariadb.org/browse/MDEV-10465 https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt https://linux.oracle.com/cve/CVE-2016-6662.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3078-1 https://www.exploit-db.com/exploits/40360/ https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
|
libmysqlclient18 |
CVE-2016-6663 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.openwall.com/lists/oss-security/2016/10/25/4 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92911 http://www.securityfocus.com/bid/93614 https://access.redhat.com/security/cve/CVE-2016-6663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663 https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805 https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291 https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6663.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://www.exploit-db.com/exploits/40678/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
libmysqlclient18 |
CVE-2016-6664 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.securityfocus.com/archive/1/539695/100/0/threaded http://www.securityfocus.com/bid/93612 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2016-6664 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664 https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6664.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://nvd.nist.gov/vuln/detail/CVE-2016-6664 https://security.gentoo.org/glsa/201702-18 https://www.exploit-db.com/exploits/40679/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
libmysqlclient18 |
CVE-2016-7440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93659 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-7440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://ubuntu.com/security/notices/USN-3109-1 https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
|
libmysqlclient18 |
CVE-2016-8283 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93737 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-8283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283 https://linux.oracle.com/cve/CVE-2016-8283.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
libmysqlclient18 |
CVE-2017-10268 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101390 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10268 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268 https://linux.oracle.com/cve/CVE-2017-10268.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2017-10378 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101375 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378 https://linux.oracle.com/cve/CVE-2017-10378.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2017-10379 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101415 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10379 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379 https://linux.oracle.com/cve/CVE-2017-10379.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
libmysqlclient18 |
CVE-2017-10384 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101406 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384 https://linux.oracle.com/cve/CVE-2017-10384.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
libmysqlclient18 |
CVE-2017-3238 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95571 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238 https://linux.oracle.com/cve/CVE-2017-3238.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
libmysqlclient18 |
CVE-2017-3243 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95538 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3243 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243 https://linux.oracle.com/cve/CVE-2017-3243.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
libmysqlclient18 |
CVE-2017-3244 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95565 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3244 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244 https://linux.oracle.com/cve/CVE-2017-3244.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
libmysqlclient18 |
CVE-2017-3258 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95560 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258 https://linux.oracle.com/cve/CVE-2017-3258.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
libmysqlclient18 |
CVE-2017-3265 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95520 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3265 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265 https://linux.oracle.com/cve/CVE-2017-3265.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
libmysqlclient18 |
CVE-2017-3291 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95501 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291 https://linux.oracle.com/cve/CVE-2017-3291.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
libmysqlclient18 |
CVE-2017-3305 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://riddle.link/ http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/03/17/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97023 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/security/cve/CVE-2017-3305 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3308 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97725 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3308.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3309 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97742 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3309 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3309.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3312 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95491 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3312 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312 https://linux.oracle.com/cve/CVE-2017-3312.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
libmysqlclient18 |
CVE-2017-3313 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3809 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95527 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3313 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313 https://linux.oracle.com/cve/CVE-2017-3313.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://ubuntu.com/security/notices/USN-3174-1
|
libmysqlclient18 |
CVE-2017-3317 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95585 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3317 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317 https://linux.oracle.com/cve/CVE-2017-3317.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
libmysqlclient18 |
CVE-2017-3318 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95588 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318 https://linux.oracle.com/cve/CVE-2017-3318.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
libmysqlclient18 |
CVE-2017-3329 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97763 http://www.securitytracker.com/id/1038287 https://access.redhat.com/security/cve/CVE-2017-3329 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3453 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97776 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3453 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453 https://linux.oracle.com/cve/CVE-2017-3453.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3456 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97831 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3456 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456 https://linux.oracle.com/cve/CVE-2017-3456.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3461 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97812 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3462 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97851 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3463 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97849 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3463 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3464 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97818 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3464 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464 https://linux.oracle.com/cve/CVE-2017-3464.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3600 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97765 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3600 https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/ https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600 https://linux.oracle.com/cve/CVE-2017-3600.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3635 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99730 http://www.securitytracker.com/id/1038928 https://access.redhat.com/security/cve/CVE-2017-3635 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3636 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99736 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3636 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636 https://linux.oracle.com/cve/CVE-2017-3636.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
libmysqlclient18 |
CVE-2017-3641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99767 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641 https://linux.oracle.com/cve/CVE-2017-3641.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
libmysqlclient18 |
CVE-2017-3648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99789 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3651 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99802 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651 https://linux.oracle.com/cve/CVE-2017-3651.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3652 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99805 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3652 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
libmysqlclient18 |
CVE-2017-3653 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99810 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3653 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653 https://linux.oracle.com/cve/CVE-2017-3653.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
libmysqlclient18 |
CVE-2018-2562 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102713 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562 https://linux.oracle.com/cve/CVE-2018-2562.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-2622 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102706 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622 https://linux.oracle.com/cve/CVE-2018-2622.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-2640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102678 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640 https://linux.oracle.com/cve/CVE-2018-2640.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-2665 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102681 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2665 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665 https://linux.oracle.com/cve/CVE-2018-2665.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-2668 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102682 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2668 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668 https://linux.oracle.com/cve/CVE-2018-2668.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-2755 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103807 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755 https://linux.oracle.com/cve/CVE-2018-2755.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-2761 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103820 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2761 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761 https://linux.oracle.com/cve/CVE-2018-2761.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-2767 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/103954 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2018-2767 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767 https://linux.oracle.com/cve/CVE-2018-2767.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-2771 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103828 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2771 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771 https://linux.oracle.com/cve/CVE-2018-2771.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-2773 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103811 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
libmysqlclient18 |
CVE-2018-2781 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103825 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781 https://linux.oracle.com/cve/CVE-2018-2781.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-2813 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103830 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813 https://linux.oracle.com/cve/CVE-2018-2813.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-2817 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103818 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2817 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817 https://linux.oracle.com/cve/CVE-2018-2817.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-2818 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103824 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2818 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
libmysqlclient18 |
CVE-2018-2819 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103814 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819 https://linux.oracle.com/cve/CVE-2018-2819.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-3058 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3058 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058 https://linux.oracle.com/cve/CVE-2018-3058.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-3063 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104786 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3063 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063 https://linux.oracle.com/cve/CVE-2018-3063.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-3066 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3066 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066 https://linux.oracle.com/cve/CVE-2018-3066.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-3070 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-3070 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/
|
libmysqlclient18 |
CVE-2018-3081 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104779 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081 https://linux.oracle.com/cve/CVE-2018-3081.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
libmysqlclient18 |
CVE-2018-3133 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3133 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
libmysqlclient18 |
CVE-2018-3174 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105612 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3174 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
libmysqlclient18 |
CVE-2018-3282 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3282 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282 https://linux.oracle.com/cve/CVE-2018-3282.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
libmysqlclient18 |
CVE-2017-3302 |
LOW |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3809 http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/01/28/1 http://www.openwall.com/lists/oss-security/2017/02/11/11 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/96162 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3302 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302 https://linux.oracle.com/cve/CVE-2017-3302.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
libpam-modules |
CVE-2013-7041 |
LOW |
1.1.8-1ubuntu2 |
1.1.8-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2013/12/09/16 http://www.openwall.com/lists/oss-security/2013/12/09/5 http://www.securityfocus.com/bid/64180 http://www.ubuntu.com/usn/USN-2935-1 http://www.ubuntu.com/usn/USN-2935-2 http://www.ubuntu.com/usn/USN-2935-3 https://access.redhat.com/security/cve/CVE-2013-7041 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731368 https://bugzilla.redhat.com/show_bug.cgi?id=1038555 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7041 https://security.gentoo.org/glsa/201605-05 https://ubuntu.com/security/notices/USN-2935-1
|
libpam-modules |
CVE-2014-2583 |
LOW |
1.1.8-1ubuntu2 |
1.1.8-1ubuntu2.1 |
Expand...http://secunia.com/advisories/57317 http://www.openwall.com/lists/oss-security/2014/03/24/5 http://www.openwall.com/lists/oss-security/2014/03/26 http://www.openwall.com/lists/oss-security/2014/03/26/10 http://www.openwall.com/lists/oss-security/2014/03/31/6 http://www.securityfocus.com/bid/66493 http://www.ubuntu.com/usn/USN-2935-1 http://www.ubuntu.com/usn/USN-2935-2 http://www.ubuntu.com/usn/USN-2935-3 https://access.redhat.com/security/cve/CVE-2014-2583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583 https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8 https://security.gentoo.org/glsa/201605-05 https://ubuntu.com/security/notices/USN-2935-1
|
libpam-modules |
CVE-2015-3238 |
LOW |
1.1.8-1ubuntu2 |
1.1.8-1ubuntu2.1 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html http://rhn.redhat.com/errata/RHSA-2015-1640.html http://www.openwall.com/lists/oss-security/2015/06/25/13 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.securityfocus.com/bid/75428 http://www.ubuntu.com/usn/USN-2935-1 http://www.ubuntu.com/usn/USN-2935-2 http://www.ubuntu.com/usn/USN-2935-3 https://access.redhat.com/security/cve/CVE-2015-3238 https://bugzilla.redhat.com/show_bug.cgi?id=1228571 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238 https://linux.oracle.com/cve/CVE-2015-3238.html https://linux.oracle.com/errata/ELSA-2015-1640.html https://security.gentoo.org/glsa/201605-05 https://ubuntu.com/security/notices/USN-2935-1 https://www.redhat.com/archives/pam-list/2015-June/msg00001.html https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551 https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/
|
libpam-modules-bin |
CVE-2013-7041 |
LOW |
1.1.8-1ubuntu2 |
1.1.8-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2013/12/09/16 http://www.openwall.com/lists/oss-security/2013/12/09/5 http://www.securityfocus.com/bid/64180 http://www.ubuntu.com/usn/USN-2935-1 http://www.ubuntu.com/usn/USN-2935-2 http://www.ubuntu.com/usn/USN-2935-3 https://access.redhat.com/security/cve/CVE-2013-7041 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731368 https://bugzilla.redhat.com/show_bug.cgi?id=1038555 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7041 https://security.gentoo.org/glsa/201605-05 https://ubuntu.com/security/notices/USN-2935-1
|
libpam-modules-bin |
CVE-2014-2583 |
LOW |
1.1.8-1ubuntu2 |
1.1.8-1ubuntu2.1 |
Expand...http://secunia.com/advisories/57317 http://www.openwall.com/lists/oss-security/2014/03/24/5 http://www.openwall.com/lists/oss-security/2014/03/26 http://www.openwall.com/lists/oss-security/2014/03/26/10 http://www.openwall.com/lists/oss-security/2014/03/31/6 http://www.securityfocus.com/bid/66493 http://www.ubuntu.com/usn/USN-2935-1 http://www.ubuntu.com/usn/USN-2935-2 http://www.ubuntu.com/usn/USN-2935-3 https://access.redhat.com/security/cve/CVE-2014-2583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583 https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8 https://security.gentoo.org/glsa/201605-05 https://ubuntu.com/security/notices/USN-2935-1
|
libpam-modules-bin |
CVE-2015-3238 |
LOW |
1.1.8-1ubuntu2 |
1.1.8-1ubuntu2.1 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html http://rhn.redhat.com/errata/RHSA-2015-1640.html http://www.openwall.com/lists/oss-security/2015/06/25/13 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.securityfocus.com/bid/75428 http://www.ubuntu.com/usn/USN-2935-1 http://www.ubuntu.com/usn/USN-2935-2 http://www.ubuntu.com/usn/USN-2935-3 https://access.redhat.com/security/cve/CVE-2015-3238 https://bugzilla.redhat.com/show_bug.cgi?id=1228571 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238 https://linux.oracle.com/cve/CVE-2015-3238.html https://linux.oracle.com/errata/ELSA-2015-1640.html https://security.gentoo.org/glsa/201605-05 https://ubuntu.com/security/notices/USN-2935-1 https://www.redhat.com/archives/pam-list/2015-June/msg00001.html https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551 https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/
|
libpam-runtime |
CVE-2013-7041 |
LOW |
1.1.8-1ubuntu2 |
1.1.8-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2013/12/09/16 http://www.openwall.com/lists/oss-security/2013/12/09/5 http://www.securityfocus.com/bid/64180 http://www.ubuntu.com/usn/USN-2935-1 http://www.ubuntu.com/usn/USN-2935-2 http://www.ubuntu.com/usn/USN-2935-3 https://access.redhat.com/security/cve/CVE-2013-7041 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731368 https://bugzilla.redhat.com/show_bug.cgi?id=1038555 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7041 https://security.gentoo.org/glsa/201605-05 https://ubuntu.com/security/notices/USN-2935-1
|
libpam-runtime |
CVE-2014-2583 |
LOW |
1.1.8-1ubuntu2 |
1.1.8-1ubuntu2.1 |
Expand...http://secunia.com/advisories/57317 http://www.openwall.com/lists/oss-security/2014/03/24/5 http://www.openwall.com/lists/oss-security/2014/03/26 http://www.openwall.com/lists/oss-security/2014/03/26/10 http://www.openwall.com/lists/oss-security/2014/03/31/6 http://www.securityfocus.com/bid/66493 http://www.ubuntu.com/usn/USN-2935-1 http://www.ubuntu.com/usn/USN-2935-2 http://www.ubuntu.com/usn/USN-2935-3 https://access.redhat.com/security/cve/CVE-2014-2583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583 https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8 https://security.gentoo.org/glsa/201605-05 https://ubuntu.com/security/notices/USN-2935-1
|
libpam-runtime |
CVE-2015-3238 |
LOW |
1.1.8-1ubuntu2 |
1.1.8-1ubuntu2.1 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html http://rhn.redhat.com/errata/RHSA-2015-1640.html http://www.openwall.com/lists/oss-security/2015/06/25/13 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.securityfocus.com/bid/75428 http://www.ubuntu.com/usn/USN-2935-1 http://www.ubuntu.com/usn/USN-2935-2 http://www.ubuntu.com/usn/USN-2935-3 https://access.redhat.com/security/cve/CVE-2015-3238 https://bugzilla.redhat.com/show_bug.cgi?id=1228571 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238 https://linux.oracle.com/cve/CVE-2015-3238.html https://linux.oracle.com/errata/ELSA-2015-1640.html https://security.gentoo.org/glsa/201605-05 https://ubuntu.com/security/notices/USN-2935-1 https://www.redhat.com/archives/pam-list/2015-June/msg00001.html https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551 https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/
|
libpam0g |
CVE-2013-7041 |
LOW |
1.1.8-1ubuntu2 |
1.1.8-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2013/12/09/16 http://www.openwall.com/lists/oss-security/2013/12/09/5 http://www.securityfocus.com/bid/64180 http://www.ubuntu.com/usn/USN-2935-1 http://www.ubuntu.com/usn/USN-2935-2 http://www.ubuntu.com/usn/USN-2935-3 https://access.redhat.com/security/cve/CVE-2013-7041 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731368 https://bugzilla.redhat.com/show_bug.cgi?id=1038555 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7041 https://security.gentoo.org/glsa/201605-05 https://ubuntu.com/security/notices/USN-2935-1
|
libpam0g |
CVE-2014-2583 |
LOW |
1.1.8-1ubuntu2 |
1.1.8-1ubuntu2.1 |
Expand...http://secunia.com/advisories/57317 http://www.openwall.com/lists/oss-security/2014/03/24/5 http://www.openwall.com/lists/oss-security/2014/03/26 http://www.openwall.com/lists/oss-security/2014/03/26/10 http://www.openwall.com/lists/oss-security/2014/03/31/6 http://www.securityfocus.com/bid/66493 http://www.ubuntu.com/usn/USN-2935-1 http://www.ubuntu.com/usn/USN-2935-2 http://www.ubuntu.com/usn/USN-2935-3 https://access.redhat.com/security/cve/CVE-2014-2583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583 https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8 https://security.gentoo.org/glsa/201605-05 https://ubuntu.com/security/notices/USN-2935-1
|
libpam0g |
CVE-2015-3238 |
LOW |
1.1.8-1ubuntu2 |
1.1.8-1ubuntu2.1 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html http://rhn.redhat.com/errata/RHSA-2015-1640.html http://www.openwall.com/lists/oss-security/2015/06/25/13 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.securityfocus.com/bid/75428 http://www.ubuntu.com/usn/USN-2935-1 http://www.ubuntu.com/usn/USN-2935-2 http://www.ubuntu.com/usn/USN-2935-3 https://access.redhat.com/security/cve/CVE-2015-3238 https://bugzilla.redhat.com/show_bug.cgi?id=1228571 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238 https://linux.oracle.com/cve/CVE-2015-3238.html https://linux.oracle.com/errata/ELSA-2015-1640.html https://security.gentoo.org/glsa/201605-05 https://ubuntu.com/security/notices/USN-2935-1 https://www.redhat.com/archives/pam-list/2015-June/msg00001.html https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551 https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/
|
libpcre3 |
CVE-2016-3191 |
MEDIUM |
1:8.31-2ubuntu2.1 |
1:8.31-2ubuntu2.2 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html http://vcs.pcre.org/pcre2?view=revision&revision=489 http://vcs.pcre.org/pcre?view=revision&revision=1631 http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/84810 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-3191 https://bto.bluecoat.com/security-advisory/sa128 https://bugs.debian.org/815920 https://bugs.debian.org/815921 https://bugs.exim.org/show_bug.cgi?id=1791 https://bugzilla.redhat.com/show_bug.cgi?id=1311503 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191 https://linux.oracle.com/cve/CVE-2016-3191.html https://linux.oracle.com/errata/ELSA-2016-1025.html https://ubuntu.com/security/notices/USN-2943-1 https://www.tenable.com/security/tns-2016-18
|
libpcre3 |
CVE-2015-2328 |
LOW |
1:8.31-2ubuntu2.1 |
1:8.31-2ubuntu2.2 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 http://www.fortiguard.com/advisory/FG-VD-15-014/ http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/74924 https://access.redhat.com/security/cve/CVE-2015-2328 https://bugs.exim.org/show_bug.cgi?id=1515 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328 https://jira.mongodb.org/browse/SERVER-17252 https://linux.oracle.com/cve/CVE-2015-2328.html https://linux.oracle.com/errata/ELSA-2016-1025.html https://ubuntu.com/security/notices/USN-2943-1
|
libpcre3 |
CVE-2015-8380 |
LOW |
1:8.31-2ubuntu2.1 |
1:8.31-2ubuntu2.2 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.securityfocus.com/bid/77695 https://access.redhat.com/security/cve/CVE-2015-8380 https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html https://bto.bluecoat.com/security-advisory/sa128 https://bugs.exim.org/show_bug.cgi?id=1637 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380 https://security.gentoo.org/glsa/201607-02 https://ubuntu.com/security/notices/USN-2943-1
|
libpcre3 |
CVE-2015-8382 |
LOW |
1:8.31-2ubuntu2.1 |
1:8.31-2ubuntu2.2 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=c351b47ce85a3a147cfa801fa9f0149ab4160834 http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510 http://www.openwall.com/lists/oss-security/2015/08/04/2 http://www.openwall.com/lists/oss-security/2015/08/04/3 http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.securityfocus.com/bid/76157 https://access.redhat.com/security/cve/CVE-2015-8382 https://bto.bluecoat.com/security-advisory/sa128 https://bugs.exim.org/show_bug.cgi?id=1537 https://bugzilla.redhat.com/show_bug.cgi?id=1187225 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382 https://ubuntu.com/security/notices/USN-2943-1
|
libpcre3 |
CVE-2015-8385 |
LOW |
1:8.31-2ubuntu2.1 |
1:8.31-2ubuntu2.2 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/85572 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2015-8385 https://bto.bluecoat.com/security-advisory/sa128 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385 https://linux.oracle.com/cve/CVE-2015-8385.html https://linux.oracle.com/errata/ELSA-2016-1025.html https://security.gentoo.org/glsa/201607-02 https://ubuntu.com/security/notices/USN-2943-1
|
libpcre3 |
CVE-2015-8386 |
LOW |
1:8.31-2ubuntu2.1 |
1:8.31-2ubuntu2.2 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html http://rhn.redhat.com/errata/RHSA-2016-1025.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/82990 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2015-8386 https://bto.bluecoat.com/security-advisory/sa128 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://linux.oracle.com/cve/CVE-2015-8386.html https://linux.oracle.com/errata/ELSA-2016-1025.html https://security.gentoo.org/glsa/201607-02 https://ubuntu.com/security/notices/USN-2943-1
|
libpcre3 |
CVE-2015-8387 |
LOW |
1:8.31-2ubuntu2.1 |
1:8.31-2ubuntu2.2 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.securityfocus.com/bid/82990 https://access.redhat.com/security/cve/CVE-2015-8387 https://bto.bluecoat.com/security-advisory/sa128 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201607-02 https://ubuntu.com/security/notices/USN-2943-1
|
libpcre3 |
CVE-2015-8390 |
LOW |
1:8.31-2ubuntu2.1 |
1:8.31-2ubuntu2.2 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.securityfocus.com/bid/82990 https://access.redhat.com/security/cve/CVE-2015-8390 https://bto.bluecoat.com/security-advisory/sa128 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201607-02 https://ubuntu.com/security/notices/USN-2943-1
|
libpcre3 |
CVE-2015-8391 |
LOW |
1:8.31-2ubuntu2.1 |
1:8.31-2ubuntu2.2 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html http://rhn.redhat.com/errata/RHSA-2016-1025.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/82990 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2015-8391 https://bto.bluecoat.com/security-advisory/sa128 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://linux.oracle.com/cve/CVE-2015-8391.html https://linux.oracle.com/errata/ELSA-2016-1025.html https://security.gentoo.org/glsa/201607-02 https://ubuntu.com/security/notices/USN-2943-1
|
libpcre3 |
CVE-2015-8393 |
LOW |
1:8.31-2ubuntu2.1 |
1:8.31-2ubuntu2.2 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.securityfocus.com/bid/82990 https://access.redhat.com/security/cve/CVE-2015-8393 https://bto.bluecoat.com/security-advisory/sa128 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201607-02 https://ubuntu.com/security/notices/USN-2943-1
|
libpcre3 |
CVE-2015-8394 |
LOW |
1:8.31-2ubuntu2.1 |
1:8.31-2ubuntu2.2 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.securityfocus.com/bid/82990 https://access.redhat.com/security/cve/CVE-2015-8394 https://bto.bluecoat.com/security-advisory/sa128 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201607-02 https://ubuntu.com/security/notices/USN-2943-1
|
libpng12-0 |
CVE-2016-10087 |
LOW |
1.2.50-1ubuntu2.14.04.2 |
1.2.50-1ubuntu2.14.04.3 |
Expand...http://www.openwall.com/lists/oss-security/2016/12/29/2 http://www.openwall.com/lists/oss-security/2016/12/30/4 http://www.securityfocus.com/bid/95157 https://access.redhat.com/security/cve/CVE-2016-10087 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-74 https://sourceforge.net/p/libpng/code/ci/243d4e5f3fe71740d52a53cf3dd77cc83a3430ba https://sourceforge.net/p/libpng/code/ci/794a15fad6add4d636369d0b46f603a02995b2e2/ (libpng12) https://sourceforge.net/p/libpng/code/ci/812768d7a9c973452222d454634496b25ed415eb (libpng16) https://ubuntu.com/security/notices/USN-3712-1 https://ubuntu.com/security/notices/USN-3712-2 https://usn.ubuntu.com/3712-1/ https://usn.ubuntu.com/3712-2/
|
libprocps3 |
CVE-2018-1122 |
MEDIUM |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 https://access.redhat.com/errata/RHSA-2019:2189 https://access.redhat.com/errata/RHSA-2020:0595 https://access.redhat.com/security/cve/CVE-2018-1122 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1122 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1122 https://linux.oracle.com/cve/CVE-2018-1122.html https://linux.oracle.com/errata/ELSA-2019-2189.html https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html https://security.gentoo.org/glsa/201805-14 https://ubuntu.com/security/notices/USN-3658-1 https://ubuntu.com/security/notices/USN-3658-3 https://usn.ubuntu.com/3658-1/ https://usn.ubuntu.com/3658-3/ https://www.debian.org/security/2018/dsa-4208 https://www.exploit-db.com/exploits/44806/ https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
libprocps3 |
CVE-2018-1123 |
MEDIUM |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 https://access.redhat.com/security/cve/CVE-2018-1123 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html https://security.gentoo.org/glsa/201805-14 https://ubuntu.com/security/notices/USN-3658-1 https://ubuntu.com/security/notices/USN-3658-3 https://usn.ubuntu.com/3658-1/ https://usn.ubuntu.com/3658-3/ https://www.debian.org/security/2018/dsa-4208 https://www.exploit-db.com/exploits/44806/ https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
libprocps3 |
CVE-2018-1124 |
MEDIUM |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 http://www.securitytracker.com/id/1041057 https://access.redhat.com/errata/RHSA-2018:1700 https://access.redhat.com/errata/RHSA-2018:1777 https://access.redhat.com/errata/RHSA-2018:1820 https://access.redhat.com/errata/RHSA-2018:2267 https://access.redhat.com/errata/RHSA-2018:2268 https://access.redhat.com/errata/RHSA-2019:1944 https://access.redhat.com/errata/RHSA-2019:2401 https://access.redhat.com/security/cve/CVE-2018-1124 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124 https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 https://kc.mcafee.com/corporate/index?page=content&id=SB10241 https://linux.oracle.com/cve/CVE-2018-1124.html https://linux.oracle.com/errata/ELSA-2018-1777.html https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html https://security.gentoo.org/glsa/201805-14 https://ubuntu.com/security/notices/USN-3658-1 https://ubuntu.com/security/notices/USN-3658-2 https://usn.ubuntu.com/3658-1/ https://usn.ubuntu.com/3658-2/ https://www.debian.org/security/2018/dsa-4208 https://www.exploit-db.com/exploits/44806/ https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
libprocps3 |
CVE-2018-1125 |
MEDIUM |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 https://access.redhat.com/security/cve/CVE-2018-1125 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125 https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html https://ubuntu.com/security/notices/USN-3658-1 https://ubuntu.com/security/notices/USN-3658-3 https://usn.ubuntu.com/3658-1/ https://usn.ubuntu.com/3658-3/ https://www.debian.org/security/2018/dsa-4208 https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
libprocps3 |
CVE-2018-1126 |
MEDIUM |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 http://www.securitytracker.com/id/1041057 https://access.redhat.com/errata/RHSA-2018:1700 https://access.redhat.com/errata/RHSA-2018:1777 https://access.redhat.com/errata/RHSA-2018:1820 https://access.redhat.com/errata/RHSA-2018:2267 https://access.redhat.com/errata/RHSA-2018:2268 https://access.redhat.com/errata/RHSA-2019:1944 https://access.redhat.com/security/cve/CVE-2018-1126 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1126 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1126 https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 https://linux.oracle.com/cve/CVE-2018-1126.html https://linux.oracle.com/errata/ELSA-2018-1777.html https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html https://ubuntu.com/security/notices/USN-3658-1 https://ubuntu.com/security/notices/USN-3658-2 https://usn.ubuntu.com/3658-1/ https://usn.ubuntu.com/3658-2/ https://www.debian.org/security/2018/dsa-4208 https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
libpython2.7-minimal |
CVE-2016-0772 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/9 http://www.securityfocus.com/bid/91225 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-0772 https://bugzilla.redhat.com/show_bug.cgi?id=1303647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://hg.python.org/cpython/rev/b3ce713fb9be https://hg.python.org/cpython/rev/d590114c2394 https://linux.oracle.com/cve/CVE-2016-0772.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
libpython2.7-minimal |
CVE-2016-1000110 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2016-1000110 https://bugs.python.org/issue27568 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110 https://linux.oracle.com/cve/CVE-2016-1000110.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/ https://security-tracker.debian.org/tracker/CVE-2016-1000110 https://ubuntu.com/security/notices/USN-3134-1
|
libpython2.7-minimal |
CVE-2016-5636 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-2586.html http://www.openwall.com/lists/oss-security/2016/06/15/15 http://www.openwall.com/lists/oss-security/2016/06/16/1 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91247 http://www.securitytracker.com/id/1038138 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5636 https://bugs.python.org/issue26171 https://bugs.python.org/msg278228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://linux.oracle.com/cve/CVE-2016-5636.html https://linux.oracle.com/errata/ELSA-2016-2586.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
libpython2.7-minimal |
CVE-2016-5699 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/7 http://www.openwall.com/lists/oss-security/2016/06/15/12 http://www.openwall.com/lists/oss-security/2016/06/16/2 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91226 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5699 https://bugs.python.org/issue22928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4 https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS https://hg.python.org/cpython/rev/1c45047c5102 https://hg.python.org/cpython/rev/bf3e1c9b80e9 https://linux.oracle.com/cve/CVE-2016-5699.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://ubuntu.com/security/notices/USN-3134-1
|
libpython2.7-minimal |
CVE-2017-1000158 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.4 |
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html http://www.securitytracker.com/id/1039890 https://access.redhat.com/security/cve/CVE-2017-1000158 https://bugs.python.org/issue30657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158 https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://security.gentoo.org/glsa/201805-02 https://ubuntu.com/security/notices/USN-3496-1 https://ubuntu.com/security/notices/USN-3496-2 https://ubuntu.com/security/notices/USN-3496-3 https://www.debian.org/security/2018/dsa-4307
|
libpython2.7-minimal |
CVE-2018-1000802 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2018-1000802 https://bugs.python.org/issue34540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802 https://github.com/python/cpython/pull/8985 https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306
|
libpython2.7-minimal |
CVE-2018-14647 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securityfocus.com/bid/105396 http://www.securitytracker.com/id/1041740 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:2030 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-14647 https://bugs.python.org/issue34623 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647 https://linux.oracle.com/cve/CVE-2018-14647.html https://linux.oracle.com/errata/ELSA-2019-2030.html https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/ https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
libpython2.7-minimal |
CVE-2018-1000030 |
LOW |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030 https://bugs.python.org/issue31530 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030 https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view https://security.gentoo.org/glsa/201811-02 https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0 https://www.oracle.com/security-alerts/cpujan2020.html
|
libpython2.7-minimal |
CVE-2018-1060 |
LOW |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1060 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1060.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307 https://www.oracle.com/security-alerts/cpujan2020.html
|
libpython2.7-minimal |
CVE-2018-1061 |
LOW |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1061 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1061.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
libpython2.7-stdlib |
CVE-2016-0772 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/9 http://www.securityfocus.com/bid/91225 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-0772 https://bugzilla.redhat.com/show_bug.cgi?id=1303647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://hg.python.org/cpython/rev/b3ce713fb9be https://hg.python.org/cpython/rev/d590114c2394 https://linux.oracle.com/cve/CVE-2016-0772.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
libpython2.7-stdlib |
CVE-2016-1000110 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2016-1000110 https://bugs.python.org/issue27568 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110 https://linux.oracle.com/cve/CVE-2016-1000110.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/ https://security-tracker.debian.org/tracker/CVE-2016-1000110 https://ubuntu.com/security/notices/USN-3134-1
|
libpython2.7-stdlib |
CVE-2016-5636 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-2586.html http://www.openwall.com/lists/oss-security/2016/06/15/15 http://www.openwall.com/lists/oss-security/2016/06/16/1 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91247 http://www.securitytracker.com/id/1038138 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5636 https://bugs.python.org/issue26171 https://bugs.python.org/msg278228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://linux.oracle.com/cve/CVE-2016-5636.html https://linux.oracle.com/errata/ELSA-2016-2586.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
libpython2.7-stdlib |
CVE-2016-5699 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/7 http://www.openwall.com/lists/oss-security/2016/06/15/12 http://www.openwall.com/lists/oss-security/2016/06/16/2 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91226 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5699 https://bugs.python.org/issue22928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4 https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS https://hg.python.org/cpython/rev/1c45047c5102 https://hg.python.org/cpython/rev/bf3e1c9b80e9 https://linux.oracle.com/cve/CVE-2016-5699.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://ubuntu.com/security/notices/USN-3134-1
|
libpython2.7-stdlib |
CVE-2017-1000158 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.4 |
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html http://www.securitytracker.com/id/1039890 https://access.redhat.com/security/cve/CVE-2017-1000158 https://bugs.python.org/issue30657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158 https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://security.gentoo.org/glsa/201805-02 https://ubuntu.com/security/notices/USN-3496-1 https://ubuntu.com/security/notices/USN-3496-2 https://ubuntu.com/security/notices/USN-3496-3 https://www.debian.org/security/2018/dsa-4307
|
libpython2.7-stdlib |
CVE-2018-1000802 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2018-1000802 https://bugs.python.org/issue34540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802 https://github.com/python/cpython/pull/8985 https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306
|
libpython2.7-stdlib |
CVE-2018-14647 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securityfocus.com/bid/105396 http://www.securitytracker.com/id/1041740 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:2030 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-14647 https://bugs.python.org/issue34623 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647 https://linux.oracle.com/cve/CVE-2018-14647.html https://linux.oracle.com/errata/ELSA-2019-2030.html https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/ https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
libpython2.7-stdlib |
CVE-2018-1000030 |
LOW |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030 https://bugs.python.org/issue31530 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030 https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view https://security.gentoo.org/glsa/201811-02 https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0 https://www.oracle.com/security-alerts/cpujan2020.html
|
libpython2.7-stdlib |
CVE-2018-1060 |
LOW |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1060 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1060.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307 https://www.oracle.com/security-alerts/cpujan2020.html
|
libpython2.7-stdlib |
CVE-2018-1061 |
LOW |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1061 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1061.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
libpython3.4-minimal |
CVE-2016-0772 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/9 http://www.securityfocus.com/bid/91225 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-0772 https://bugzilla.redhat.com/show_bug.cgi?id=1303647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://hg.python.org/cpython/rev/b3ce713fb9be https://hg.python.org/cpython/rev/d590114c2394 https://linux.oracle.com/cve/CVE-2016-0772.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
libpython3.4-minimal |
CVE-2016-1000110 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2016-1000110 https://bugs.python.org/issue27568 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110 https://linux.oracle.com/cve/CVE-2016-1000110.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/ https://security-tracker.debian.org/tracker/CVE-2016-1000110 https://ubuntu.com/security/notices/USN-3134-1
|
libpython3.4-minimal |
CVE-2016-5636 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-2586.html http://www.openwall.com/lists/oss-security/2016/06/15/15 http://www.openwall.com/lists/oss-security/2016/06/16/1 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91247 http://www.securitytracker.com/id/1038138 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5636 https://bugs.python.org/issue26171 https://bugs.python.org/msg278228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://linux.oracle.com/cve/CVE-2016-5636.html https://linux.oracle.com/errata/ELSA-2016-2586.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
libpython3.4-minimal |
CVE-2016-5699 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/7 http://www.openwall.com/lists/oss-security/2016/06/15/12 http://www.openwall.com/lists/oss-security/2016/06/16/2 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91226 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5699 https://bugs.python.org/issue22928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4 https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS https://hg.python.org/cpython/rev/1c45047c5102 https://hg.python.org/cpython/rev/bf3e1c9b80e9 https://linux.oracle.com/cve/CVE-2016-5699.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://ubuntu.com/security/notices/USN-3134-1
|
libpython3.4-minimal |
CVE-2017-1000158 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.6 |
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html http://www.securitytracker.com/id/1039890 https://access.redhat.com/security/cve/CVE-2017-1000158 https://bugs.python.org/issue30657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158 https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://security.gentoo.org/glsa/201805-02 https://ubuntu.com/security/notices/USN-3496-1 https://ubuntu.com/security/notices/USN-3496-2 https://ubuntu.com/security/notices/USN-3496-3 https://www.debian.org/security/2018/dsa-4307
|
libpython3.4-minimal |
CVE-2018-1000802 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2018-1000802 https://bugs.python.org/issue34540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802 https://github.com/python/cpython/pull/8985 https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306
|
libpython3.4-minimal |
CVE-2018-14647 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securityfocus.com/bid/105396 http://www.securitytracker.com/id/1041740 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:2030 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-14647 https://bugs.python.org/issue34623 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647 https://linux.oracle.com/cve/CVE-2018-14647.html https://linux.oracle.com/errata/ELSA-2019-2030.html https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/ https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
libpython3.4-minimal |
CVE-2018-1060 |
LOW |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1060 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1060.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307 https://www.oracle.com/security-alerts/cpujan2020.html
|
libpython3.4-minimal |
CVE-2018-1061 |
LOW |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1061 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1061.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
libpython3.4-stdlib |
CVE-2016-0772 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/9 http://www.securityfocus.com/bid/91225 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-0772 https://bugzilla.redhat.com/show_bug.cgi?id=1303647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://hg.python.org/cpython/rev/b3ce713fb9be https://hg.python.org/cpython/rev/d590114c2394 https://linux.oracle.com/cve/CVE-2016-0772.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
libpython3.4-stdlib |
CVE-2016-1000110 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2016-1000110 https://bugs.python.org/issue27568 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110 https://linux.oracle.com/cve/CVE-2016-1000110.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/ https://security-tracker.debian.org/tracker/CVE-2016-1000110 https://ubuntu.com/security/notices/USN-3134-1
|
libpython3.4-stdlib |
CVE-2016-5636 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-2586.html http://www.openwall.com/lists/oss-security/2016/06/15/15 http://www.openwall.com/lists/oss-security/2016/06/16/1 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91247 http://www.securitytracker.com/id/1038138 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5636 https://bugs.python.org/issue26171 https://bugs.python.org/msg278228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://linux.oracle.com/cve/CVE-2016-5636.html https://linux.oracle.com/errata/ELSA-2016-2586.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
libpython3.4-stdlib |
CVE-2016-5699 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/7 http://www.openwall.com/lists/oss-security/2016/06/15/12 http://www.openwall.com/lists/oss-security/2016/06/16/2 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91226 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5699 https://bugs.python.org/issue22928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4 https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS https://hg.python.org/cpython/rev/1c45047c5102 https://hg.python.org/cpython/rev/bf3e1c9b80e9 https://linux.oracle.com/cve/CVE-2016-5699.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://ubuntu.com/security/notices/USN-3134-1
|
libpython3.4-stdlib |
CVE-2017-1000158 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.6 |
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html http://www.securitytracker.com/id/1039890 https://access.redhat.com/security/cve/CVE-2017-1000158 https://bugs.python.org/issue30657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158 https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://security.gentoo.org/glsa/201805-02 https://ubuntu.com/security/notices/USN-3496-1 https://ubuntu.com/security/notices/USN-3496-2 https://ubuntu.com/security/notices/USN-3496-3 https://www.debian.org/security/2018/dsa-4307
|
libpython3.4-stdlib |
CVE-2018-1000802 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2018-1000802 https://bugs.python.org/issue34540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802 https://github.com/python/cpython/pull/8985 https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306
|
libpython3.4-stdlib |
CVE-2018-14647 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securityfocus.com/bid/105396 http://www.securitytracker.com/id/1041740 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:2030 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-14647 https://bugs.python.org/issue34623 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647 https://linux.oracle.com/cve/CVE-2018-14647.html https://linux.oracle.com/errata/ELSA-2019-2030.html https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/ https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
libpython3.4-stdlib |
CVE-2018-1060 |
LOW |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1060 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1060.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307 https://www.oracle.com/security-alerts/cpujan2020.html
|
libpython3.4-stdlib |
CVE-2018-1061 |
LOW |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1061 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1061.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
libroken18-heimdal |
CVE-2017-11103 |
MEDIUM |
1.6~git20131207+dfsg-1ubuntu1.1 |
1.6~git20131207+dfsg-1ubuntu1.2 |
Expand...http://www.debian.org/security/2017/dsa-3912 http://www.h5l.org/advisories.html?show=2017-07-11 http://www.securityfocus.com/bid/99551 http://www.securitytracker.com/id/1038876 http://www.securitytracker.com/id/1039427 https://access.redhat.com/security/cve/CVE-2017-11103 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103 https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0 https://orpheus-lyre.info/ https://support.apple.com/HT208112 https://support.apple.com/HT208144 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3353-1 https://ubuntu.com/security/notices/USN-3353-2 https://ubuntu.com/security/notices/USN-3353-3 https://ubuntu.com/security/notices/USN-3353-4 https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc https://www.orpheus-lyre.info/ https://www.samba.org/samba/security/CVE-2017-11103.html
|
librtmp0 |
CVE-2015-8270 |
MEDIUM |
2.4+20121230.gitdf6c518-1 |
2.4+20121230.gitdf6c518-1ubuntu0.1 |
Expand...http://www.debian.org/security/2017/dsa-3850 http://www.securityfocus.com/bid/95126 http://www.talosintelligence.com/reports/TALOS-2016-0066/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8270 https://ubuntu.com/security/notices/USN-3283-1 https://ubuntu.com/security/notices/USN-3283-2
|
librtmp0 |
CVE-2015-8271 |
MEDIUM |
2.4+20121230.gitdf6c518-1 |
2.4+20121230.gitdf6c518-1ubuntu0.1 |
Expand...http://www.debian.org/security/2017/dsa-3850 http://www.securityfocus.com/bid/95125 http://www.talosintelligence.com/reports/TALOS-2016-0067/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8271 https://ubuntu.com/security/notices/USN-3283-1 https://ubuntu.com/security/notices/USN-3283-2
|
librtmp0 |
CVE-2015-8272 |
MEDIUM |
2.4+20121230.gitdf6c518-1 |
2.4+20121230.gitdf6c518-1ubuntu0.1 |
Expand...http://www.debian.org/security/2017/dsa-3850 http://www.securityfocus.com/bid/95123 http://www.talosintelligence.com/reports/TALOS-2016-0068/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8272 https://ubuntu.com/security/notices/USN-3283-1 https://ubuntu.com/security/notices/USN-3283-2
|
libsqlite3-0 |
CVE-2018-8740 |
LOW |
3.8.2-1ubuntu2.1 |
3.8.2-1ubuntu2.2 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html http://www.securityfocus.com/bid/103466 https://access.redhat.com/security/cve/CVE-2018-8740 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964 https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/ https://ubuntu.com/security/notices/USN-4205-1 https://ubuntu.com/security/notices/USN-4394-1 https://usn.ubuntu.com/4205-1/ https://usn.ubuntu.com/4394-1/ https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b
|
libssl1.0.0 |
CVE-2016-2107 |
HIGH |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.19 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://source.android.com/security/bulletin/2016-07-01.html http://support.citrix.com/article/CTX212736 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html http://www.debian.org/security/2016/dsa-3566 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/89760 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035721 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103 http://www.ubuntu.com/usn/USN-2959-1 https://access.redhat.com/security/cve/CVE-2016-2107 https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/ https://bto.bluecoat.com/security-advisory/sa123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107 https://git.openssl.org/?p=openssl.git;a=commit;h=68595c0c2886e7942a14f98c17a55a88afb6c292 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 https://kc.mcafee.com/corporate/index?page=content&id=SB10160 https://linux.oracle.com/cve/CVE-2016-2107.html https://linux.oracle.com/errata/ELSA-2016-3571.html https://openssl.org/news/secadv/20160503.txt https://security.gentoo.org/glsa/201612-16 https://security.netapp.com/advisory/ntap-20160504-0001/ https://support.apple.com/HT206903 https://ubuntu.com/security/notices/USN-2959-1 https://www.exploit-db.com/exploits/39768/ https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc https://www.openssl.org/news/secadv/20160503.txt https://www.tenable.com/security/tns-2016-18
|
libssl1.0.0 |
CVE-2016-2108 |
HIGH |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.19 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-2056.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://source.android.com/security/bulletin/2016-07-01.html http://support.citrix.com/article/CTX212736 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl http://www.debian.org/security/2016/dsa-3566 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/89752 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035721 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103 http://www.ubuntu.com/usn/USN-2959-1 https://access.redhat.com/errata/RHSA-2016:1137 https://access.redhat.com/errata/RHSA-2017:0193 https://access.redhat.com/errata/RHSA-2017:0194 https://access.redhat.com/security/cve/CVE-2016-2108 https://bto.bluecoat.com/security-advisory/sa123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108 https://git.openssl.org/?p=openssl.git;a=commit;h=3661bb4e7934668bd99ca777ea8b30eedfafa871 https://git.openssl.org/?p=openssl.git;a=commit;h=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 https://linux.oracle.com/cve/CVE-2016-2108.html https://linux.oracle.com/errata/ELSA-2016-3571.html https://openssl.org/news/secadv/20160503.txt https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067&languageid=en-fr https://security.gentoo.org/glsa/201612-16 https://security.netapp.com/advisory/ntap-20160504-0001/ https://support.apple.com/HT206903 https://ubuntu.com/security/notices/USN-2959-1 https://www.openssl.org/news/secadv/20160503.txt https://www.tenable.com/security/tns-2016-18
|
libssl1.0.0 |
CVE-2016-6304 |
HIGH |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html http://rhn.redhat.com/errata/RHSA-2016-1940.html http://rhn.redhat.com/errata/RHSA-2016-2802.html http://rhn.redhat.com/errata/RHSA-2017-1415.html http://rhn.redhat.com/errata/RHSA-2017-1659.html http://seclists.org/fulldisclosure/2016/Dec/47 http://seclists.org/fulldisclosure/2016/Oct/62 http://seclists.org/fulldisclosure/2017/Jul/31 http://security.360.cn/cve/CVE-2016-6304/ http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/93150 http://www.securitytracker.com/id/1036878 http://www.securitytracker.com/id/1037640 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/errata/RHSA-2017:1801 https://access.redhat.com/errata/RHSA-2017:1802 https://access.redhat.com/errata/RHSA-2017:2493 https://access.redhat.com/errata/RHSA-2017:2494 https://access.redhat.com/security/cve/CVE-2016-6304 https://bto.bluecoat.com/security-advisory/sa132 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304 https://git.openssl.org/?p=openssl.git;a=commit;h=2c0d295e26306e15a92eb23a84a1802005c1c137 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10171 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://linux.oracle.com/cve/CVE-2016-6304.html https://linux.oracle.com/errata/ELSA-2016-3621.html https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://security.gentoo.org/glsa/201612-16 https://ubuntu.com/security/notices/USN-3087-1 https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.openssl.org/news/secadv/20160922.txt https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
libssl1.0.0 |
CVE-2016-2109 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.19 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-2056.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl http://www.debian.org/security/2016/dsa-3566 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/87940 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035721 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103 http://www.ubuntu.com/usn/USN-2959-1 https://access.redhat.com/security/cve/CVE-2016-2109 https://bto.bluecoat.com/security-advisory/sa123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109 https://git.openssl.org/?p=openssl.git;a=commit;h=c62981390d6cf9e3d612c489b8b77c2913b25807 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 https://kc.mcafee.com/corporate/index?page=content&id=SB10160 https://linux.oracle.com/cve/CVE-2016-2109.html https://linux.oracle.com/errata/ELSA-2016-3576.html https://openssl.org/news/secadv/20160503.txt https://security.gentoo.org/glsa/201612-16 https://security.netapp.com/advisory/ntap-20160504-0001/ https://source.android.com/security/bulletin/2017-07-01 https://support.apple.com/HT206903 https://ubuntu.com/security/notices/USN-2959-1 https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc https://www.openssl.org/news/secadv/20160503.txt https://www.tenable.com/security/tns-2016-18
|
libssl1.0.0 |
CVE-2016-2842 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.18 |
Expand...http://marc.info/?l=bugtraq&m=145983526810210&w=2 http://marc.info/?l=bugtraq&m=146108058503441&w=2 http://openssl.org/news/secadv/20160301.txt http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/84169 https://access.redhat.com/security/cve/CVE-2016-2842 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2842 https://git.openssl.org/?p=openssl.git;a=commit;h=578b956fe741bf8e84055547b1e83c28dd902c73 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kc.mcafee.com/corporate/index?page=content&id=SB10152 https://linux.oracle.com/cve/CVE-2016-2842.html https://linux.oracle.com/errata/ELSA-2016-3571.html https://security.netapp.com/advisory/ntap-20160321-0001/
|
libssl1.0.0 |
CVE-2016-6303 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/92984 http://www.securitytracker.com/id/1036885 https://access.redhat.com/security/cve/CVE-2016-6303 https://bto.bluecoat.com/security-advisory/sa132 https://bugzilla.redhat.com/show_bug.cgi?id=1370146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303 https://git.openssl.org/?p=openssl.git;a=commit;h=55d83bf7c10c7b205fffa23fa7c3977491e56c07 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://ubuntu.com/security/notices/USN-3087-1 https://www.openssl.org/news/secadv/20160922.txt https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
libssl1.0.0 |
CVE-2016-6306 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://rhn.redhat.com/errata/RHSA-2016-1940.html http://seclists.org/fulldisclosure/2017/Jul/31 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/93153 http://www.securitytracker.com/id/1036885 http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 https://access.redhat.com/errata/RHSA-2018:2185 https://access.redhat.com/errata/RHSA-2018:2186 https://access.redhat.com/errata/RHSA-2018:2187 https://access.redhat.com/security/cve/CVE-2016-6306 https://bto.bluecoat.com/security-advisory/sa132 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306 https://git.openssl.org/?p=openssl.git;a=commit;h=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://linux.oracle.com/cve/CVE-2016-6306.html https://linux.oracle.com/errata/ELSA-2016-3627.html https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://security.gentoo.org/glsa/201612-16 https://support.f5.com/csp/article/K90492697 https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us https://ubuntu.com/security/notices/USN-3087-1 https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.openssl.org/news/secadv/20160922.txt https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
libssl1.0.0 |
CVE-2016-7056 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.22 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html http://www.securityfocus.com/bid/95375 http://www.securitytracker.com/id/1037575 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1801 https://access.redhat.com/errata/RHSA-2017:1802 https://access.redhat.com/security/cve/CVE-2016-7056 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7056 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7056 https://eprint.iacr.org/2016/1195 https://eprint.iacr.org/2016/1195.pdf https://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/033_libcrypto.patch.sig https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/016_libcrypto.patch.sig https://git.openssl.org/?p=openssl.git;a=commit;h=8aed2a7548362e88e84a7feb795a3a97e8395008 https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7056.html https://seclists.org/oss-sec/2017/q1/52 https://security-tracker.debian.org/tracker/CVE-2016-7056 https://ubuntu.com/security/notices/USN-3181-1 https://www.debian.org/security/2017/dsa-3773
|
libssl1.0.0 |
CVE-2017-3731 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.22 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-0286.html http://www.debian.org/security/2017/dsa-3773 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/95813 http://www.securitytracker.com/id/1037717 https://access.redhat.com/errata/RHSA-2018:2185 https://access.redhat.com/errata/RHSA-2018:2186 https://access.redhat.com/errata/RHSA-2018:2187 https://access.redhat.com/security/cve/CVE-2017-3731 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731 https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21 https://linux.oracle.com/cve/CVE-2017-3731.html https://linux.oracle.com/errata/ELSA-2017-0286.html https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc https://security.gentoo.org/glsa/201702-07 https://security.netapp.com/advisory/ntap-20171019-0002/ https://security.paloaltonetworks.com/CVE-2017-3731 https://source.android.com/security/bulletin/pixel/2017-11-01 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us https://ubuntu.com/security/notices/USN-3181-1 https://www.openssl.org/news/secadv/20170126.txt https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.tenable.com/security/tns-2017-04
|
libssl1.0.0 |
CVE-2018-0739 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.24 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/103518 http://www.securityfocus.com/bid/105609 http://www.securitytracker.com/id/1040576 https://access.redhat.com/errata/RHSA-2018:3090 https://access.redhat.com/errata/RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/errata/RHSA-2019:1711 https://access.redhat.com/errata/RHSA-2019:1712 https://access.redhat.com/security/cve/CVE-2018-0739 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9310d45087ae546e27e61ddf8f6367f29848220d https://linux.oracle.com/cve/CVE-2018-0739.html https://linux.oracle.com/errata/ELSA-2018-4228.html https://lists.debian.org/debian-lts-announce/2018/03/msg00033.html https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/ https://security.gentoo.org/glsa/201811-21 https://security.gentoo.org/glsa/202007-53 https://security.netapp.com/advisory/ntap-20180330-0002/ https://security.netapp.com/advisory/ntap-20180726-0002/ https://securityadvisories.paloaltonetworks.com/Home/Detail/133 https://ubuntu.com/security/notices/USN-3611-1 https://ubuntu.com/security/notices/USN-3611-2 https://usn.ubuntu.com/3611-1/ https://usn.ubuntu.com/3611-2/ https://www.debian.org/security/2018/dsa-4157 https://www.debian.org/security/2018/dsa-4158 https://www.openssl.org/news/secadv/20180327.txt https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2018-04 https://www.tenable.com/security/tns-2018-06 https://www.tenable.com/security/tns-2018-07
|
libssl1.0.0 |
CVE-2016-0702 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.18 |
Expand...http://cachebleed.info http://cachebleed.info/ http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html http://marc.info/?l=bugtraq&m=145889460330120&w=2 http://openssl.org/news/secadv/20160301.txt http://rhn.redhat.com/errata/RHSA-2016-2957.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl http://www.debian.org/security/2016/dsa-3500 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html http://www.securitytracker.com/id/1035133 http://www.ubuntu.com/usn/USN-2914-1 https://access.redhat.com/security/cve/CVE-2016-0702 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702 https://git.openssl.org/?p=openssl.git;a=commit;h=708dc2f1291e104fe4eef810bb8ffc1fae5b19c1 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 https://linux.oracle.com/cve/CVE-2016-0702.html https://linux.oracle.com/errata/ELSA-2016-0301.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc https://security.gentoo.org/glsa/201603-15 https://ssrg.nicta.com.au/projects/TS/cachebleed/ https://ubuntu.com/security/notices/USN-2914-1 https://www.openssl.org/news/secadv/20160301.txt
|
libssl1.0.0 |
CVE-2016-0705 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.18 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html http://marc.info/?l=bugtraq&m=145889460330120&w=2 http://marc.info/?l=bugtraq&m=145983526810210&w=2 http://marc.info/?l=bugtraq&m=146108058503441&w=2 http://openssl.org/news/secadv/20160301.txt http://rhn.redhat.com/errata/RHSA-2016-2957.html http://source.android.com/security/bulletin/2016-05-01.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl http://www.debian.org/security/2016/dsa-3500 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html http://www.securityfocus.com/bid/83754 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035133 http://www.ubuntu.com/usn/USN-2914-1 https://access.redhat.com/errata/RHSA-2018:2568 https://access.redhat.com/errata/RHSA-2018:2575 https://access.redhat.com/errata/RHSA-2018:2713 https://access.redhat.com/security/cve/CVE-2016-0705 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705 https://git.openssl.org/?p=openssl.git;a=commit;h=6c88c71b4e4825c7bc0489306d062d017634eb88 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 https://linux.oracle.com/cve/CVE-2016-0705.html https://linux.oracle.com/errata/ELSA-2016-0301.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc https://security.gentoo.org/glsa/201603-15 https://ubuntu.com/security/notices/USN-2914-1 https://www.openssl.org/news/secadv/20160301.txt
|
libssl1.0.0 |
CVE-2016-0797 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.18 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html http://marc.info/?l=bugtraq&m=145889460330120&w=2 http://openssl.org/news/secadv/20160301.txt http://rhn.redhat.com/errata/RHSA-2016-2957.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl http://www.debian.org/security/2016/dsa-3500 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/83763 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035133 http://www.ubuntu.com/usn/USN-2914-1 https://access.redhat.com/security/cve/CVE-2016-0797 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797 https://git.openssl.org/?p=openssl.git;a=commit;h=c175308407858afff3fc8c2e5e085d94d12edc7d https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 https://kc.mcafee.com/corporate/index?page=content&id=SB10156 https://linux.oracle.com/cve/CVE-2016-0797.html https://linux.oracle.com/errata/ELSA-2016-0302.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc https://security.gentoo.org/glsa/201603-15 https://ubuntu.com/security/notices/USN-2914-1 https://www.openssl.org/news/secadv/20160301.txt
|
libssl1.0.0 |
CVE-2016-0798 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.18 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html http://openssl.org/news/secadv/20160301.txt http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl http://www.debian.org/security/2016/dsa-3500 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/83705 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035133 http://www.ubuntu.com/usn/USN-2914-1 https://access.redhat.com/security/cve/CVE-2016-0798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798 https://git.openssl.org/?p=openssl.git;a=commit;h=259b664f950c2ba66fbf4b0fe5281327904ead21 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc https://security.gentoo.org/glsa/201603-15 https://ubuntu.com/security/notices/USN-2914-1 https://www.openssl.org/news/secadv/20160301.txt
|
libssl1.0.0 |
CVE-2016-0799 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.18 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://marc.info/?l=bugtraq&m=145983526810210&w=2 http://marc.info/?l=bugtraq&m=146108058503441&w=2 http://openssl.org/news/secadv/20160301.txt http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl http://www.debian.org/security/2016/dsa-3500 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/83755 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035133 http://www.ubuntu.com/usn/USN-2914-1 https://access.redhat.com/security/cve/CVE-2016-0799 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799 https://git.openssl.org/?p=openssl.git;a=commit;h=578b956fe741bf8e84055547b1e83c28dd902c73 https://guidovranken.wordpress.com/2016/02/27/openssl-cve-2016-0799-heap-corruption-via-bio_printf/ https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 https://linux.oracle.com/cve/CVE-2016-0799.html https://linux.oracle.com/errata/ELSA-2016-3576.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc https://security.gentoo.org/glsa/201603-15 https://ubuntu.com/security/notices/USN-2914-1 https://www.openssl.org/news/secadv/20160301.txt
|
libssl1.0.0 |
CVE-2016-2105 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.19 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-1648.html http://rhn.redhat.com/errata/RHSA-2016-1649.html http://rhn.redhat.com/errata/RHSA-2016-1650.html http://rhn.redhat.com/errata/RHSA-2016-2056.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl http://www.debian.org/security/2016/dsa-3566 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/89757 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035721 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103 http://www.ubuntu.com/usn/USN-2959-1 https://access.redhat.com/security/cve/CVE-2016-2105 https://bto.bluecoat.com/security-advisory/sa123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105 https://git.openssl.org/?p=openssl.git;a=commit;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kc.mcafee.com/corporate/index?page=content&id=SB10160 https://linux.oracle.com/cve/CVE-2016-2105.html https://linux.oracle.com/errata/ELSA-2016-3576.html https://openssl.org/news/secadv/20160503.txt https://security.gentoo.org/glsa/201612-16 https://security.netapp.com/advisory/ntap-20160504-0001/ https://source.android.com/security/bulletin/pixel/2017-11-01 https://support.apple.com/HT206903 https://ubuntu.com/security/notices/USN-2959-1 https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc https://www.openssl.org/news/secadv/20160503.txt https://www.tenable.com/security/tns-2016-18
|
libssl1.0.0 |
CVE-2016-2106 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.19 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-1648.html http://rhn.redhat.com/errata/RHSA-2016-1649.html http://rhn.redhat.com/errata/RHSA-2016-1650.html http://rhn.redhat.com/errata/RHSA-2016-2056.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl http://www.debian.org/security/2016/dsa-3566 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/89744 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035721 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103 http://www.ubuntu.com/usn/USN-2959-1 https://access.redhat.com/security/cve/CVE-2016-2106 https://bto.bluecoat.com/security-advisory/sa123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106 https://git.openssl.org/?p=openssl.git;a=commit;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 https://kc.mcafee.com/corporate/index?page=content&id=SB10160 https://linux.oracle.com/cve/CVE-2016-2106.html https://linux.oracle.com/errata/ELSA-2016-3576.html https://openssl.org/news/secadv/20160503.txt https://security.gentoo.org/glsa/201612-16 https://security.netapp.com/advisory/ntap-20160504-0001/ https://source.android.com/security/bulletin/pixel/2017-11-01 https://support.apple.com/HT206903 https://ubuntu.com/security/notices/USN-2959-1 https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc https://www.openssl.org/news/secadv/20160503.txt https://www.tenable.com/security/tns-2016-18
|
libssl1.0.0 |
CVE-2016-2177 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.22 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://rhn.redhat.com/errata/RHSA-2016-1940.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://rhn.redhat.com/errata/RHSA-2017-1659.html http://seclists.org/fulldisclosure/2017/Jul/31 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.openwall.com/lists/oss-security/2016/06/08/9 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/archive/1/540957/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/540957/100/0/threaded http://www.securityfocus.com/bid/91319 http://www.securitytracker.com/id/1036088 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 http://www.ubuntu.com/usn/USN-3181-1 https://access.redhat.com/errata/RHSA-2017:0193 https://access.redhat.com/errata/RHSA-2017:0194 https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://bto.bluecoat.com/security-advisory/sa132 https://bugzilla.redhat.com/show_bug.cgi?id=1341705 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177 https://git.openssl.org/?p=openssl.git;a=commit;h=a004e72b95835136d3f1ea90517f706c24c03da7 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03763en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10165 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://linux.oracle.com/cve/CVE-2016-2177.html https://linux.oracle.com/errata/ELSA-2016-3627.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://security.gentoo.org/glsa/201612-16 https://support.f5.com/csp/article/K23873366 https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us https://ubuntu.com/security/notices/USN-3087-1 https://ubuntu.com/security/notices/USN-3181-1 https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/ https://www.openssl.org/news/secadv/20160922.txt https://www.schneider-electric.com/en/download/document/SEVD-2018-137-01/ https://www.schneider-electric.com/en/download/document/SEVD-2018-144-01/ https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
libssl1.0.0 |
CVE-2016-2178 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://eprint.iacr.org/2016/594 http://eprint.iacr.org/2016/594.pdf http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://rhn.redhat.com/errata/RHSA-2016-1940.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://rhn.redhat.com/errata/RHSA-2017-1659.html http://seclists.org/fulldisclosure/2017/Jul/31 http://seclists.org/oss-sec/2016/q2/493 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.openwall.com/lists/oss-security/2016/06/08/10 http://www.openwall.com/lists/oss-security/2016/06/08/11 http://www.openwall.com/lists/oss-security/2016/06/08/12 http://www.openwall.com/lists/oss-security/2016/06/08/2 http://www.openwall.com/lists/oss-security/2016/06/08/4 http://www.openwall.com/lists/oss-security/2016/06/08/5 http://www.openwall.com/lists/oss-security/2016/06/08/6 http://www.openwall.com/lists/oss-security/2016/06/08/7 http://www.openwall.com/lists/oss-security/2016/06/08/8 http://www.openwall.com/lists/oss-security/2016/06/09/2 http://www.openwall.com/lists/oss-security/2016/06/09/8 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/91081 http://www.securitytracker.com/id/1036054 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 https://access.redhat.com/errata/RHSA-2017:0193 https://access.redhat.com/errata/RHSA-2017:0194 https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2178 https://bto.bluecoat.com/security-advisory/sa132 https://bugzilla.redhat.com/show_bug.cgi?id=1343400 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178 https://git.openssl.org/?p=openssl.git;a=commit;h=399944622df7bd81af62e67ea967c470534090e2 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://linux.oracle.com/cve/CVE-2016-2178.html https://linux.oracle.com/errata/ELSA-2016-3627.html https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://security.gentoo.org/glsa/201612-16 https://support.f5.com/csp/article/K53084033 https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us https://ubuntu.com/security/notices/USN-3087-1 https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.openssl.org/news/secadv/20160922.txt https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
libssl1.0.0 |
CVE-2016-2179 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://rhn.redhat.com/errata/RHSA-2016-1940.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/92987 http://www.securitytracker.com/id/1036689 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-2179 https://bto.bluecoat.com/security-advisory/sa132 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179 https://git.openssl.org/?p=openssl.git;a=commit;h=f5c7f5dfbaf0d2f7d946d0fe86f08e6bcb36ed0d https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://linux.oracle.com/cve/CVE-2016-2179.html https://linux.oracle.com/errata/ELSA-2016-3621.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us https://ubuntu.com/security/notices/USN-3087-1 https://www.openssl.org/news/secadv/20160922.txt https://www.openssl.org/news/vulnerabilities.html#y2017 https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
libssl1.0.0 |
CVE-2016-2180 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://rhn.redhat.com/errata/RHSA-2016-1940.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/92117 http://www.securitytracker.com/id/1036486 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-2180 https://bto.bluecoat.com/security-advisory/sa132 https://bugzilla.redhat.com/show_bug.cgi?id=1359615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180 https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://linux.oracle.com/cve/CVE-2016-2180.html https://linux.oracle.com/errata/ELSA-2016-3621.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://security.gentoo.org/glsa/201612-16 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us https://ubuntu.com/security/notices/USN-3087-1 https://www.openssl.org/news/secadv/20160922.txt https://www.openssl.org/news/vulnerabilities.html#y2017 https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
libssl1.0.0 |
CVE-2016-2181 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://rhn.redhat.com/errata/RHSA-2016-1940.html http://seclists.org/fulldisclosure/2017/Jul/31 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/92982 http://www.securitytracker.com/id/1036690 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 https://access.redhat.com/security/cve/CVE-2016-2181 https://bto.bluecoat.com/security-advisory/sa132 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181 https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://linux.oracle.com/cve/CVE-2016-2181.html https://linux.oracle.com/errata/ELSA-2016-3621.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://support.f5.com/csp/article/K59298921 https://ubuntu.com/security/notices/USN-3087-1 https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.openssl.org/news/secadv/20160922.txt https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
libssl1.0.0 |
CVE-2016-2182 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://rhn.redhat.com/errata/RHSA-2016-1940.html http://seclists.org/fulldisclosure/2017/Jul/31 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/92557 http://www.securitytracker.com/id/1036688 http://www.securitytracker.com/id/1037968 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 https://access.redhat.com/errata/RHSA-2018:2185 https://access.redhat.com/errata/RHSA-2018:2186 https://access.redhat.com/errata/RHSA-2018:2187 https://access.redhat.com/security/cve/CVE-2016-2182 https://bto.bluecoat.com/security-advisory/sa132 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182 https://git.openssl.org/?p=openssl.git;a=commit;h=07bed46f332fce8c1d157689a2cdf915a982ae34 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10171 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://linux.oracle.com/cve/CVE-2016-2182.html https://linux.oracle.com/errata/ELSA-2016-3627.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://source.android.com/security/bulletin/2017-03-01 https://source.android.com/security/bulletin/2017-03-01.html https://support.f5.com/csp/article/K01276005 https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us https://ubuntu.com/security/notices/USN-3087-1 https://ubuntu.com/security/notices/USN-3087-2 https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.openssl.org/news/secadv/20160922.txt https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
libssl1.0.0 |
CVE-2016-2183 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html http://rhn.redhat.com/errata/RHSA-2017-0336.html http://rhn.redhat.com/errata/RHSA-2017-0337.html http://rhn.redhat.com/errata/RHSA-2017-0338.html http://rhn.redhat.com/errata/RHSA-2017-0462.html http://seclists.org/fulldisclosure/2017/Jul/31 http://seclists.org/fulldisclosure/2017/May/105 http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 http://www-01.ibm.com/support/docview.wss?uid=swg21991482 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/archive/1/539885/100/0/threaded http://www.securityfocus.com/archive/1/540341/100/0/threaded http://www.securityfocus.com/archive/1/541104/100/0/threaded http://www.securityfocus.com/archive/1/542005/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded http://www.securityfocus.com/bid/92630 http://www.securityfocus.com/bid/95568 http://www.securitytracker.com/id/1036696 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 http://www.ubuntu.com/usn/USN-3179-1 http://www.ubuntu.com/usn/USN-3194-1 http://www.ubuntu.com/usn/USN-3198-1 http://www.ubuntu.com/usn/USN-3270-1 http://www.ubuntu.com/usn/USN-3372-1 https://access.redhat.com/articles/2548661 https://access.redhat.com/errata/RHSA-2016:1940 https://access.redhat.com/errata/RHSA-2017:1216 https://access.redhat.com/errata/RHSA-2017:2708 https://access.redhat.com/errata/RHSA-2017:2709 https://access.redhat.com/errata/RHSA-2017:2710 https://access.redhat.com/errata/RHSA-2017:3113 https://access.redhat.com/errata/RHSA-2017:3114 https://access.redhat.com/errata/RHSA-2017:3239 https://access.redhat.com/errata/RHSA-2017:3240 https://access.redhat.com/errata/RHSA-2018:2123 https://access.redhat.com/errata/RHSA-2019:1245 https://access.redhat.com/errata/RHSA-2019:2859 https://access.redhat.com/errata/RHSA-2020:0451 https://access.redhat.com/security/cve/CVE-2016-2183 https://access.redhat.com/security/cve/cve-2016-2183 https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/ https://bto.bluecoat.com/security-advisory/sa133 https://bugzilla.redhat.com/show_bug.cgi?id=1369383 https://community.qualys.com/thread/16555 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183 https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10171 https://kc.mcafee.com/corporate/index?page=content&id=SB10186 https://kc.mcafee.com/corporate/index?page=content&id=SB10197 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://kc.mcafee.com/corporate/index?page=content&id=SB10310 https://linux.oracle.com/cve/CVE-2016-2183.html https://linux.oracle.com/errata/ELSA-2018-2123.html https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575 https://seclists.org/bugtraq/2018/Nov/21 https://security-tracker.debian.org/tracker/CVE-2016-2183 https://security.gentoo.org/glsa/201612-16 https://security.gentoo.org/glsa/201701-65 https://security.gentoo.org/glsa/201707-01 https://security.netapp.com/advisory/ntap-20160915-0001/ https://security.netapp.com/advisory/ntap-20170119-0001/ https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613 https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178 https://support.f5.com/csp/article/K13167034 https://sweet32.info/ https://twitter.com/symantec/status/768786631159603200 https://ubuntu.com/security/notices/USN-3087-1 https://ubuntu.com/security/notices/USN-3179-1 https://ubuntu.com/security/notices/USN-3194-1 https://ubuntu.com/security/notices/USN-3198-1 https://ubuntu.com/security/notices/USN-3270-1 https://ubuntu.com/security/notices/USN-3372-1 https://wiki.opendaylight.org/view/Security_Advisories https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.exploit-db.com/exploits/42091/ https://www.ietf.org/mail-archive/web/tls/current/msg04560.html https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008 https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/ https://www.openssl.org/blog/blog/2016/08/24/sweet32/ https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.sigsac.org/ccs/CCS2016/accepted-papers/ https://www.suse.com/security/cve/CVE-2016-2183.html https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21 https://www.tenable.com/security/tns-2017-09 https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
|
libssl1.0.0 |
CVE-2016-6302 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://rhn.redhat.com/errata/RHSA-2016-1940.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/92628 http://www.securitytracker.com/id/1036885 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/errata/RHSA-2018:2185 https://access.redhat.com/errata/RHSA-2018:2186 https://access.redhat.com/errata/RHSA-2018:2187 https://access.redhat.com/security/cve/CVE-2016-6302 https://bto.bluecoat.com/security-advisory/sa132 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302 https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://linux.oracle.com/cve/CVE-2016-6302.html https://linux.oracle.com/errata/ELSA-2016-3621.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://ubuntu.com/security/notices/USN-3087-1 https://www.openssl.org/news/secadv/20160922.txt https://www.openssl.org/news/vulnerabilities.html#y2017 https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
libssl1.0.0 |
CVE-2016-8610 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.22 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-0286.html http://rhn.redhat.com/errata/RHSA-2017-0574.html http://rhn.redhat.com/errata/RHSA-2017-1415.html http://rhn.redhat.com/errata/RHSA-2017-1659.html http://seclists.org/oss-sec/2016/q4/224 http://security.360.cn/cve/CVE-2016-8610 http://security.360.cn/cve/CVE-2016-8610/ http://www.openwall.com/lists/oss-security/2016/10/24/3 http://www.securityfocus.com/bid/93841 http://www.securitytracker.com/id/1037084 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/errata/RHSA-2017:1801 https://access.redhat.com/errata/RHSA-2017:1802 https://access.redhat.com/errata/RHSA-2017:2493 https://access.redhat.com/errata/RHSA-2017:2494 https://access.redhat.com/security/cve/CVE-2016-8610 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610 https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401 https://linux.oracle.com/cve/CVE-2016-8610.html https://linux.oracle.com/errata/ELSA-2017-0574.html https://security.360.cn/cve/CVE-2016-8610/ https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc https://security.netapp.com/advisory/ntap-20171130-0001/ https://security.paloaltonetworks.com/CVE-2016-8610 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us https://ubuntu.com/security/notices/USN-3181-1 https://ubuntu.com/security/notices/USN-3183-1 https://ubuntu.com/security/notices/USN-3183-2 https://www.debian.org/security/2017/dsa-3773 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
libssl1.0.0 |
CVE-2017-3735 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.23 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/100515 http://www.securitytracker.com/id/1039726 https://access.redhat.com/errata/RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/security/cve/CVE-2017-3735 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735 https://github.com/openssl/openssl/commit/068b963bb7afc57f5bdd723de0dd15e7795d5822 https://linux.oracle.com/cve/CVE-2017-3735.html https://linux.oracle.com/errata/ELSA-2018-4187.html https://lists.debian.org/debian-lts-announce/2017/11/msg00011.html https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc https://security.gentoo.org/glsa/201712-03 https://security.netapp.com/advisory/ntap-20170927-0001/ https://security.netapp.com/advisory/ntap-20171107-0002/ https://support.apple.com/HT208331 https://ubuntu.com/security/notices/USN-3475-1 https://ubuntu.com/security/notices/USN-3611-2 https://usn.ubuntu.com/3611-2/ https://www.debian.org/security/2017/dsa-4017 https://www.debian.org/security/2017/dsa-4018 https://www.openssl.org/news/secadv/20170828.txt https://www.openssl.org/news/secadv/20171102.txt https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2017-14 https://www.tenable.com/security/tns-2017-15
|
libssl1.0.0 |
CVE-2018-0495 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.26 |
Expand...http://www.securitytracker.com/id/1041144 http://www.securitytracker.com/id/1041147 https://access.redhat.com/errata/RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1296 https://access.redhat.com/errata/RHSA-2019:1297 https://access.redhat.com/errata/RHSA-2019:1543 https://access.redhat.com/errata/RHSA-2019:2237 https://access.redhat.com/security/cve/CVE-2018-0495 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495 https://dev.gnupg.org/T4011 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.38_release_notes https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965 https://linux.oracle.com/cve/CVE-2018-0495.html https://linux.oracle.com/errata/ELSA-2019-2237.html https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html https://ubuntu.com/security/notices/USN-3689-1 https://ubuntu.com/security/notices/USN-3689-2 https://ubuntu.com/security/notices/USN-3692-1 https://ubuntu.com/security/notices/USN-3692-2 https://ubuntu.com/security/notices/USN-3850-1 https://ubuntu.com/security/notices/USN-3850-2 https://usn.ubuntu.com/3689-1/ https://usn.ubuntu.com/3689-2/ https://usn.ubuntu.com/3692-1/ https://usn.ubuntu.com/3692-2/ https://usn.ubuntu.com/3850-1/ https://usn.ubuntu.com/3850-2/ https://www.debian.org/security/2018/dsa-4231 https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
libssl1.0.0 |
CVE-2018-0732 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.26 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/104442 http://www.securitytracker.com/id/1041090 https://access.redhat.com/errata/RHSA-2018:2552 https://access.redhat.com/errata/RHSA-2018:2553 https://access.redhat.com/errata/RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1296 https://access.redhat.com/errata/RHSA-2019:1297 https://access.redhat.com/errata/RHSA-2019:1543 https://access.redhat.com/security/cve/CVE-2018-0732 https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4 https://linux.oracle.com/cve/CVE-2018-0732.html https://linux.oracle.com/errata/ELSA-2018-4249.html https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/ https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/ https://security.gentoo.org/glsa/201811-03 https://security.netapp.com/advisory/ntap-20181105-0001/ https://security.netapp.com/advisory/ntap-20190118-0002/ https://securityadvisories.paloaltonetworks.com/Home/Detail/133 https://ubuntu.com/security/notices/USN-3692-1 https://ubuntu.com/security/notices/USN-3692-2 https://usn.ubuntu.com/3692-1/ https://usn.ubuntu.com/3692-2/ https://www.debian.org/security/2018/dsa-4348 https://www.debian.org/security/2018/dsa-4355 https://www.openssl.org/news/secadv/20180612.txt https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://www.tenable.com/security/tns-2018-12 https://www.tenable.com/security/tns-2018-13 https://www.tenable.com/security/tns-2018-14 https://www.tenable.com/security/tns-2018-17
|
libssl1.0.0 |
CVE-2018-0734 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html http://www.securityfocus.com/bid/105758 https://access.redhat.com/errata/RHSA-2019:2304 https://access.redhat.com/errata/RHSA-2019:3700 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/security/cve/CVE-2018-0734 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=43e6a58d4991a451daf4891ff05a48735df871ac https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7 https://linux.oracle.com/cve/CVE-2018-0734.html https://linux.oracle.com/errata/ELSA-2019-3700.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/ https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ https://nvd.nist.gov/vuln/detail/CVE-2018-0734 https://security.netapp.com/advisory/ntap-20181105-0002/ https://security.netapp.com/advisory/ntap-20190118-0002/ https://security.netapp.com/advisory/ntap-20190423-0002/ https://ubuntu.com/security/notices/USN-3840-1 https://usn.ubuntu.com/3840-1/ https://www.debian.org/security/2018/dsa-4348 https://www.debian.org/security/2018/dsa-4355 https://www.openssl.org/news/secadv/20181030.txt https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2018-16 https://www.tenable.com/security/tns-2018-17
|
libssl1.0.0 |
CVE-2018-0737 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.26 |
Expand...http://www.openwall.com/lists/oss-security/2018/04/16/3 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/103766 http://www.securitytracker.com/id/1040685 https://access.redhat.com/errata/RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/security/cve/CVE-2018-0737 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787 https://linux.oracle.com/cve/CVE-2018-0737.html https://linux.oracle.com/errata/ELSA-2018-4249.html https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/ https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/ https://security.gentoo.org/glsa/201811-21 https://security.netapp.com/advisory/ntap-20180726-0003/ https://securityadvisories.paloaltonetworks.com/Home/Detail/133 https://ubuntu.com/security/notices/USN-3628-1 https://ubuntu.com/security/notices/USN-3628-2 https://ubuntu.com/security/notices/USN-3692-1 https://ubuntu.com/security/notices/USN-3692-2 https://usn.ubuntu.com/3628-1/ https://usn.ubuntu.com/3628-2/ https://usn.ubuntu.com/3692-1/ https://usn.ubuntu.com/3692-2/ https://www.debian.org/security/2018/dsa-4348 https://www.debian.org/security/2018/dsa-4355 https://www.openssl.org/news/secadv/20180416.txt https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2018-12 https://www.tenable.com/security/tns-2018-13 https://www.tenable.com/security/tns-2018-14 https://www.tenable.com/security/tns-2018-17
|
libssl1.0.0 |
CVE-2018-5407 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.27 |
Expand...http://www.securityfocus.com/bid/105897 https://access.redhat.com/errata/RHSA-2019:0483 https://access.redhat.com/errata/RHSA-2019:0651 https://access.redhat.com/errata/RHSA-2019:0652 https://access.redhat.com/errata/RHSA-2019:2125 https://access.redhat.com/errata/RHSA-2019:3929 https://access.redhat.com/errata/RHSA-2019:3931 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/security/cve/CVE-2018-5407 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407 https://eprint.iacr.org/2018/1060.pdf https://github.com/bbbrumley/portsmash https://linux.oracle.com/cve/CVE-2018-5407.html https://linux.oracle.com/errata/ELSA-2019-2125.html https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ https://security.gentoo.org/glsa/201903-10 https://security.netapp.com/advisory/ntap-20181126-0001/ https://support.f5.com/csp/article/K49711130?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-3840-1 https://usn.ubuntu.com/3840-1/ https://www.debian.org/security/2018/dsa-4348 https://www.debian.org/security/2018/dsa-4355 https://www.exploit-db.com/exploits/45785/ https://www.openssl.org/news/secadv/20181112.txt https://www.openwall.com/lists/oss-security/2018/11/01/4 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2018-16 https://www.tenable.com/security/tns-2018-17
|
libtasn1-6 |
CVE-2016-4008 |
MEDIUM |
3.4-3ubuntu0.3 |
3.4-3ubuntu0.4 |
Expand...http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625 http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html http://www.debian.org/security/2016/dsa-3568 http://www.openwall.com/lists/oss-security/2016/04/11/3 http://www.ubuntu.com/usn/USN-2957-1 http://www.ubuntu.com/usn/USN-2957-2 https://access.redhat.com/security/cve/CVE-2016-4008 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008 https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html https://security.gentoo.org/glsa/201703-05 https://ubuntu.com/security/notices/USN-2957-1 https://ubuntu.com/security/notices/USN-2957-2
|
libtasn1-6 |
CVE-2017-6891 |
MEDIUM |
3.4-3ubuntu0.3 |
3.4-3ubuntu0.5 |
Expand...http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html http://www.debian.org/security/2017/dsa-3861 http://www.securityfocus.com/bid/98641 http://www.securitytracker.com/id/1038619 https://access.redhat.com/security/cve/CVE-2017-6891 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6891 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://secuniaresearch.flexerasoftware.com/advisories/76125/ https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/ https://security.gentoo.org/glsa/201710-11 https://ubuntu.com/security/notices/USN-3309-1 https://ubuntu.com/security/notices/USN-3309-2
|
libtasn1-6 |
CVE-2017-10790 |
LOW |
3.4-3ubuntu0.3 |
3.4-3ubuntu0.6 |
Expand...https://access.redhat.com/security/cve/CVE-2017-10790 https://bugzilla.redhat.com/show_bug.cgi?id=1464141 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html https://security.gentoo.org/glsa/201710-11 https://ubuntu.com/security/notices/USN-3547-1 https://usn.ubuntu.com/3547-1/ https://www.debian.org/security/2018/dsa-4106
|
libudev1 |
CVE-2018-1049 |
MEDIUM |
204-5ubuntu20.15 |
204-5ubuntu20.26 |
Expand...http://www.securitytracker.com/id/1041520 https://access.redhat.com/errata/RHSA-2018:0260 https://access.redhat.com/security/cve/CVE-2018-1049 https://bugzilla.redhat.com/show_bug.cgi?id=1534701 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049 https://github.com/systemd/systemd/pull/5916 https://linux.oracle.com/cve/CVE-2018-1049.html https://linux.oracle.com/errata/ELSA-2018-0260.html https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html https://ubuntu.com/security/notices/USN-3558-1 https://usn.ubuntu.com/3558-1/
|
libudev1 |
CVE-2019-3842 |
MEDIUM |
204-5ubuntu20.15 |
204-5ubuntu20.31 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html https://access.redhat.com/security/cve/CVE-2019-3842 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842 https://linux.oracle.com/cve/CVE-2019-3842.html https://linux.oracle.com/errata/ELSA-2021-1611.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/ https://nvd.nist.gov/vuln/detail/CVE-2019-3842 https://ubuntu.com/security/notices/USN-3938-1 https://www.exploit-db.com/exploits/46743/
|
libwind0-heimdal |
CVE-2017-11103 |
MEDIUM |
1.6~git20131207+dfsg-1ubuntu1.1 |
1.6~git20131207+dfsg-1ubuntu1.2 |
Expand...http://www.debian.org/security/2017/dsa-3912 http://www.h5l.org/advisories.html?show=2017-07-11 http://www.securityfocus.com/bid/99551 http://www.securitytracker.com/id/1038876 http://www.securitytracker.com/id/1039427 https://access.redhat.com/security/cve/CVE-2017-11103 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103 https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0 https://orpheus-lyre.info/ https://support.apple.com/HT208112 https://support.apple.com/HT208144 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3353-1 https://ubuntu.com/security/notices/USN-3353-2 https://ubuntu.com/security/notices/USN-3353-3 https://ubuntu.com/security/notices/USN-3353-4 https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc https://www.orpheus-lyre.info/ https://www.samba.org/samba/security/CVE-2017-11103.html
|
libx11-6 |
CVE-2018-14598 |
MEDIUM |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2018/08/21/6 http://www.securityfocus.com/bid/105177 http://www.securitytracker.com/id/1041543 https://access.redhat.com/errata/RHSA-2019:2079 https://access.redhat.com/security/cve/CVE-2018-14598 https://bugzilla.suse.com/show_bug.cgi?id=1102073 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=e83722768fd5c467ef61fa159e8c6278770b45c2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598 https://linux.oracle.com/cve/CVE-2018-14598.html https://linux.oracle.com/errata/ELSA-2019-2079.html https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGARUV66TS5OOSLR5A76BUB7SDV6GO4F/ https://lists.x.org/archives/xorg-announce/2018-August/002916.html https://security.gentoo.org/glsa/201811-01 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
libx11-6 |
CVE-2018-14599 |
MEDIUM |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2018/08/21/6 http://www.securityfocus.com/bid/105177 http://www.securitytracker.com/id/1041543 https://access.redhat.com/errata/RHSA-2019:2079 https://access.redhat.com/security/cve/CVE-2018-14599 https://bugzilla.suse.com/show_bug.cgi?id=1102062 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=b469da1430cdcee06e31c6251b83aede072a1ff0 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599 https://linux.oracle.com/cve/CVE-2018-14599.html https://linux.oracle.com/errata/ELSA-2019-2079.html https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGARUV66TS5OOSLR5A76BUB7SDV6GO4F/ https://lists.x.org/archives/xorg-announce/2018-August/002916.html https://security.gentoo.org/glsa/201811-01 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
libx11-6 |
CVE-2018-14600 |
MEDIUM |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2018/08/21/6 http://www.securityfocus.com/bid/105177 http://www.securitytracker.com/id/1041543 https://access.redhat.com/errata/RHSA-2019:2079 https://access.redhat.com/security/cve/CVE-2018-14600 https://bugzilla.suse.com/show_bug.cgi?id=1102068 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=dbf72805fd9d7b1846fe9a11b46f3994bfc27fea https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600 https://linux.oracle.com/cve/CVE-2018-14600.html https://linux.oracle.com/errata/ELSA-2019-2079.html https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html https://lists.x.org/archives/xorg-announce/2018-August/002916.html https://security.gentoo.org/glsa/201811-01 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
libx11-6 |
CVE-2016-7942 |
LOW |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93363 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7942 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
libx11-6 |
CVE-2016-7943 |
LOW |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93362 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7943 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
libx11-data |
CVE-2018-14598 |
MEDIUM |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2018/08/21/6 http://www.securityfocus.com/bid/105177 http://www.securitytracker.com/id/1041543 https://access.redhat.com/errata/RHSA-2019:2079 https://access.redhat.com/security/cve/CVE-2018-14598 https://bugzilla.suse.com/show_bug.cgi?id=1102073 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=e83722768fd5c467ef61fa159e8c6278770b45c2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598 https://linux.oracle.com/cve/CVE-2018-14598.html https://linux.oracle.com/errata/ELSA-2019-2079.html https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGARUV66TS5OOSLR5A76BUB7SDV6GO4F/ https://lists.x.org/archives/xorg-announce/2018-August/002916.html https://security.gentoo.org/glsa/201811-01 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
libx11-data |
CVE-2018-14599 |
MEDIUM |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2018/08/21/6 http://www.securityfocus.com/bid/105177 http://www.securitytracker.com/id/1041543 https://access.redhat.com/errata/RHSA-2019:2079 https://access.redhat.com/security/cve/CVE-2018-14599 https://bugzilla.suse.com/show_bug.cgi?id=1102062 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=b469da1430cdcee06e31c6251b83aede072a1ff0 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599 https://linux.oracle.com/cve/CVE-2018-14599.html https://linux.oracle.com/errata/ELSA-2019-2079.html https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGARUV66TS5OOSLR5A76BUB7SDV6GO4F/ https://lists.x.org/archives/xorg-announce/2018-August/002916.html https://security.gentoo.org/glsa/201811-01 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
libx11-data |
CVE-2018-14600 |
MEDIUM |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2018/08/21/6 http://www.securityfocus.com/bid/105177 http://www.securitytracker.com/id/1041543 https://access.redhat.com/errata/RHSA-2019:2079 https://access.redhat.com/security/cve/CVE-2018-14600 https://bugzilla.suse.com/show_bug.cgi?id=1102068 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=dbf72805fd9d7b1846fe9a11b46f3994bfc27fea https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600 https://linux.oracle.com/cve/CVE-2018-14600.html https://linux.oracle.com/errata/ELSA-2019-2079.html https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html https://lists.x.org/archives/xorg-announce/2018-August/002916.html https://security.gentoo.org/glsa/201811-01 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
libx11-data |
CVE-2016-7942 |
LOW |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93363 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7942 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
libx11-data |
CVE-2016-7943 |
LOW |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93362 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7943 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
libxml2 |
CVE-2016-1762 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html http://lists.apple.com/archives/security-announce/2016/Mar/msg00005.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/85059 http://www.securitytracker.com/id/1035353 http://www.ubuntu.com/usn/USN-2994-1 http://xmlsoft.org/news.html https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-1762 https://bugzilla.gnome.org/show_bug.cgi?id=759671 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762 https://git.gnome.org/browse/libxml2/commit/?id=a7a94612aa3b16779e2c74e1fa353b5d9786c602 https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-1762.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://support.apple.com/HT206166 https://support.apple.com/HT206167 https://support.apple.com/HT206168 https://support.apple.com/HT206169 https://support.apple.com/HT206171 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593
|
libxml2 |
CVE-2016-1833 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00001.html http://lists.apple.com/archives/security-announce/2016/May/msg00002.html http://lists.apple.com/archives/security-announce/2016/May/msg00003.html http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/90691 http://www.securitytracker.com/id/1035890 http://www.ubuntu.com/usn/USN-2994-1 http://xmlsoft.org/news.html https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-1833 https://bugs.chromium.org/p/project-zero/issues/detail?id=636 https://bugzilla.gnome.org/show_bug.cgi?id=758606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833 https://git.gnome.org/browse/libxml2/commit/?id=0bcd05c5cd83dec3406c8f68b769b1d610c72f76 https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-1833.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://support.apple.com/HT206564 https://support.apple.com/HT206566 https://support.apple.com/HT206567 https://support.apple.com/HT206568 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-1834 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00001.html http://lists.apple.com/archives/security-announce/2016/May/msg00002.html http://lists.apple.com/archives/security-announce/2016/May/msg00003.html http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/90691 http://www.securitytracker.com/id/1035890 http://www.ubuntu.com/usn/USN-2994-1 http://xmlsoft.org/news.html https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-1834 https://bugzilla.gnome.org/show_bug.cgi?id=763071 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834 https://git.gnome.org/browse/libxml2/commit/?id=8fbbf5513d609c1770b391b99e33314cd0742704 https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-1834.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://support.apple.com/HT206564 https://support.apple.com/HT206566 https://support.apple.com/HT206567 https://support.apple.com/HT206568 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-1835 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00002.html http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/90696 http://www.securitytracker.com/id/1035890 http://www.ubuntu.com/usn/USN-2994-1 http://xmlsoft.org/news.html https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-1835 https://bugzilla.gnome.org/show_bug.cgi?id=759020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835 https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9f60551906fb https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-1835.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://support.apple.com/HT206567 https://support.apple.com/HT206568 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-1836 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html http://lists.apple.com/archives/security-announce/2016/May/msg00001.html http://lists.apple.com/archives/security-announce/2016/May/msg00002.html http://lists.apple.com/archives/security-announce/2016/May/msg00003.html http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/90691 http://www.securitytracker.com/id/1035890 http://www.ubuntu.com/usn/USN-2994-1 http://xmlsoft.org/news.html https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-1836 https://bugzilla.gnome.org/show_bug.cgi?id=759398 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1836 https://git.gnome.org/browse/libxml2/commit/?id=45752d2c334b50016666d8f0ec3691e2d680f0a0 https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-1836.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://security.gentoo.org/glsa/201701-37 https://support.apple.com/HT206564 https://support.apple.com/HT206566 https://support.apple.com/HT206567 https://support.apple.com/HT206568 https://support.apple.com/HT206899 https://support.apple.com/HT206901 https://support.apple.com/HT206902 https://support.apple.com/HT206903 https://support.apple.com/HT206904 https://support.apple.com/HT206905 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-1837 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00001.html http://lists.apple.com/archives/security-announce/2016/May/msg00002.html http://lists.apple.com/archives/security-announce/2016/May/msg00003.html http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/90691 http://www.securitytracker.com/id/1035890 http://www.ubuntu.com/usn/USN-2994-1 http://xmlsoft.org/news.html https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-1837 https://bugzilla.gnome.org/show_bug.cgi?id=760263 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837 https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852 https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-1837.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://support.apple.com/HT206564 https://support.apple.com/HT206566 https://support.apple.com/HT206567 https://support.apple.com/HT206568 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-1838 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00001.html http://lists.apple.com/archives/security-announce/2016/May/msg00002.html http://lists.apple.com/archives/security-announce/2016/May/msg00003.html http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/90691 http://www.securitytracker.com/id/1035890 http://www.ubuntu.com/usn/USN-2994-1 http://xmlsoft.org/news.html https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-1838 https://bugs.chromium.org/p/project-zero/issues/detail?id=639 https://bugzilla.gnome.org/show_bug.cgi?id=758588 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838 https://git.gnome.org/browse/libxml2/commit/?id=db07dd613e461df93dde7902c6505629bf0734e9 https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-1838.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://security.gentoo.org/glsa/201701-37 https://support.apple.com/HT206564 https://support.apple.com/HT206566 https://support.apple.com/HT206567 https://support.apple.com/HT206568 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-1839 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00001.html http://lists.apple.com/archives/security-announce/2016/May/msg00002.html http://lists.apple.com/archives/security-announce/2016/May/msg00003.html http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/90691 http://www.securitytracker.com/id/1035890 http://www.securitytracker.com/id/1038623 http://www.ubuntu.com/usn/USN-2994-1 http://xmlsoft.org/news.html https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-1839 https://bugzilla.gnome.org/show_bug.cgi?id=758605 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839 https://git.gnome.org/browse/libxml2/commit/?id=a820dbeac29d330bae4be05d9ecd939ad6b4aa33 https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-1839.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://security.gentoo.org/glsa/201701-37 https://support.apple.com/HT206564 https://support.apple.com/HT206566 https://support.apple.com/HT206567 https://support.apple.com/HT206568 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-1840 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00001.html http://lists.apple.com/archives/security-announce/2016/May/msg00002.html http://lists.apple.com/archives/security-announce/2016/May/msg00003.html http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/90691 http://www.securitytracker.com/id/1035890 http://www.ubuntu.com/usn/USN-2994-1 http://xmlsoft.org/news.html https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-1840 https://bugzilla.gnome.org/show_bug.cgi?id=757711 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840 https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4 https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-1840.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://security.gentoo.org/glsa/201701-37 https://support.apple.com/HT206564 https://support.apple.com/HT206566 https://support.apple.com/HT206567 https://support.apple.com/HT206568 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-4658 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.9 |
Expand...http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html http://www.securityfocus.com/bid/93054 http://www.securitytracker.com/id/1036858 http://www.securitytracker.com/id/1038623 https://access.redhat.com/security/cve/CVE-2016-4658 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658 https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b https://github.com/advisories/GHSA-fr52-4hqw-p27f https://github.com/sparklemotion/nokogiri/issues/1615 https://linux.oracle.com/cve/CVE-2016-4658.html https://linux.oracle.com/errata/ELSA-2021-3810.html https://nvd.nist.gov/vuln/detail/CVE-2016-4658 https://security.gentoo.org/glsa/201701-37 https://support.apple.com/HT207141 https://support.apple.com/HT207142 https://support.apple.com/HT207143 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3235-1
|
libxml2 |
CVE-2016-5131 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.9 |
Expand...http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html http://rhn.redhat.com/errata/RHSA-2016-1485.html http://www.debian.org/security/2016/dsa-3637 http://www.securityfocus.com/bid/92053 http://www.securitytracker.com/id/1036428 http://www.securitytracker.com/id/1038623 http://www.ubuntu.com/usn/USN-3041-1 https://access.redhat.com/security/cve/CVE-2016-5131 https://bugzilla.redhat.com/show_bug.cgi?id=1358641 https://codereview.chromium.org/2127493002 https://crbug.com/623378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131 https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html https://linux.oracle.com/cve/CVE-2016-5131.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://security.gentoo.org/glsa/201610-09 https://security.gentoo.org/glsa/201701-37 https://source.android.com/security/bulletin/2017-05-01 https://support.apple.com/HT207141 https://support.apple.com/HT207142 https://support.apple.com/HT207143 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3041-1 https://ubuntu.com/security/notices/USN-3235-1
|
libxml2 |
CVE-2017-0663 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.10 |
Expand...http://www.debian.org/security/2017/dsa-3952 http://www.securityfocus.com/bid/98877 http://www.securitytracker.com/id/1038623 https://access.redhat.com/security/cve/CVE-2017-0663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0663 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201711-01 https://source.android.com/security/bulletin/2017-06-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2
|
libxml2 |
CVE-2017-15412 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.12 |
Expand...http://www.securitytracker.com/id/1040348 https://access.redhat.com/errata/RHSA-2017:3401 https://access.redhat.com/errata/RHSA-2018:0287 https://access.redhat.com/security/cve/CVE-2017-15412 https://bugzilla.gnome.org/show_bug.cgi?id=783160 https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html https://crbug.com/727039 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412 https://github.com/sparklemotion/nokogiri/issues/1714 https://linux.oracle.com/cve/CVE-2017-15412.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://lists.debian.org/debian-lts-announce/2017/12/msg00014.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-15412.html https://security.gentoo.org/glsa/201801-03 https://ubuntu.com/security/notices/USN-3513-1 https://ubuntu.com/security/notices/USN-3513-2 https://usn.ubuntu.com/usn/usn-3513-1/ https://www.debian.org/security/2018/dsa-4086
|
libxml2 |
CVE-2017-7375 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.10 |
Expand...http://www.securityfocus.com/bid/98877 http://www.securitytracker.com/id/1038623 https://access.redhat.com/security/cve/CVE-2017-7375 https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa https://bugzilla.redhat.com/show_bug.cgi?id=1462203 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7375 https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e https://security.gentoo.org/glsa/201711-01 https://source.android.com/security/bulletin/2017-06-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2 https://www.debian.org/security/2017/dsa-3952
|
libxml2 |
CVE-2017-7376 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.10 |
Expand...http://www.securityfocus.com/bid/98877 http://www.securitytracker.com/id/1038623 https://access.redhat.com/security/cve/CVE-2017-7376 https://android.googlesource.com/platform/external/libxml2/+/51e0cb2e5ec18eaf6fb331bc573ff27b743898f4 https://bugzilla.redhat.com/show_bug.cgi?id=1462216 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7376 https://git.gnome.org/browse/libxml2/commit/?id=5dca9eea1bd4263bfa4d037ab2443de1cd730f7e https://source.android.com/security/bulletin/2017-06-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2 https://www.debian.org/security/2017/dsa-3952
|
libxml2 |
CVE-2017-9047 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.10 |
Expand...http://www.debian.org/security/2017/dsa-3952 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98599 https://access.redhat.com/security/cve/CVE-2017-9047 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2
|
libxml2 |
CVE-2017-9048 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.10 |
Expand...http://www.debian.org/security/2017/dsa-3952 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98556 https://access.redhat.com/security/cve/CVE-2017-9048 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2
|
libxml2 |
CVE-2017-9049 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.10 |
Expand...http://www.debian.org/security/2017/dsa-3952 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98601 https://access.redhat.com/security/cve/CVE-2017-9049 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2
|
libxml2 |
CVE-2017-9050 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.10 |
Expand...http://www.debian.org/security/2017/dsa-3952 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98568 https://access.redhat.com/security/cve/CVE-2017-9050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050 https://github.com/advisories/GHSA-8c56-cpmw-89x7 https://github.com/sparklemotion/nokogiri/issues/1673 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2017-9050 https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-0663.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7375.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7376.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9047.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9048.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9049.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9050.html https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2 https://usn.ubuntu.com/usn/usn-3424-1/
|
libxml2 |
CVE-2018-14404 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.13 |
Expand...https://access.redhat.com/errata/RHSA-2019:1543 https://access.redhat.com/security/cve/CVE-2018-14404 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817 https://bugzilla.redhat.com/show_bug.cgi?id=1595985 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404 https://github.com/advisories/GHSA-6qvp-r6r3-9p7h https://github.com/sparklemotion/nokogiri/issues/1785 https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74 https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594 https://gitlab.gnome.org/GNOME/libxml2/issues/10 https://groups.google.com/forum/#!msg/ruby-security-ann/uVrmO2HjqQw/Fw3ocLI0BQAJ https://linux.oracle.com/cve/CVE-2018-14404.html https://linux.oracle.com/errata/ELSA-2020-1827.html https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://nvd.nist.gov/vuln/detail/CVE-2018-14404 https://security.netapp.com/advisory/ntap-20190719-0002/ https://ubuntu.com/security/notices/USN-3739-1 https://ubuntu.com/security/notices/USN-3739-2 https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/3739-2/
|
libxml2 |
CVE-2018-14567 |
MEDIUM |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.13 |
Expand...http://www.securityfocus.com/bid/105198 https://access.redhat.com/security/cve/CVE-2018-14567 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567 https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74 https://linux.oracle.com/cve/CVE-2018-14567.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://ubuntu.com/security/notices/USN-3739-1 https://usn.ubuntu.com/3739-1/
|
libxml2 |
CVE-2015-8806 |
LOW |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://www.openwall.com/lists/oss-security/2016/02/03/5 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/82071 http://www.ubuntu.com/usn/USN-2994-1 http://www.ubuntu.com/usn/usn-2994-1/ https://access.redhat.com/security/cve/CVE-2015-8806 https://bugzilla.gnome.org/show_bug.cgi?id=749115 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8806 https://github.com/advisories/GHSA-7hp2-xwpj-95jq https://github.com/sparklemotion/nokogiri/commit/03d402212707bd5dfa0a21b7de5e91a7f9d90028 https://github.com/sparklemotion/nokogiri/issues/1473 https://mail.gnome.org/archives/xml/2016-May/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2015-8806 https://security.gentoo.org/glsa/201701-37 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593
|
libxml2 |
CVE-2016-2073 |
LOW |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://www.openwall.com/lists/oss-security/2016/01/25/6 http://www.openwall.com/lists/oss-security/2016/01/26/7 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/85267 http://www.securitytracker.com/id/1035011 http://www.ubuntu.com/usn/USN-2994-1 https://access.redhat.com/security/cve/CVE-2016-2073 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2073 https://security.gentoo.org/glsa/201701-37 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593
|
libxml2 |
CVE-2016-3627 |
LOW |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://seclists.org/fulldisclosure/2016/May/10 http://www.openwall.com/lists/oss-security/2016/03/21/2 http://www.openwall.com/lists/oss-security/2016/03/21/3 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/84992 http://www.securitytracker.com/id/1035335 http://www.ubuntu.com/usn/USN-2994-1 https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-3627 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239 https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-3627.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://security.gentoo.org/glsa/201701-37 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-3705 |
LOW |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://seclists.org/fulldisclosure/2016/May/10 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/89854 http://www.ubuntu.com/usn/USN-2994-1 https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-3705 https://bugzilla.gnome.org/show_bug.cgi?id=765207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239 https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-3705.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://security.gentoo.org/glsa/201701-37 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-4447 |
LOW |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.openwall.com/lists/oss-security/2016/05/25/2 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/90864 http://www.securitytracker.com/id/1036348 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722 http://www.ubuntu.com/usn/USN-2994-1 http://xmlsoft.org/news.html https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-4447 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447 https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709 https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-4447.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://support.apple.com/HT206899 https://support.apple.com/HT206901 https://support.apple.com/HT206902 https://support.apple.com/HT206903 https://support.apple.com/HT206904 https://support.apple.com/HT206905 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-4448 |
LOW |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.9 |
Expand...http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.openwall.com/lists/oss-security/2016/05/25/2 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/90856 http://www.securitytracker.com/id/1036348 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722 http://xmlsoft.org/news.html https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-4448 https://bugzilla.redhat.com/show_bug.cgi?id=1338700 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448 https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9 https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709 https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-4448.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://support.apple.com/HT206899 https://support.apple.com/HT206901 https://support.apple.com/HT206902 https://support.apple.com/HT206903 https://support.apple.com/HT206904 https://support.apple.com/HT206905 https://ubuntu.com/security/notices/USN-3235-1 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-4449 |
LOW |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://jvn.jp/en/jp/JVN17535578/index.html http://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000066.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.openwall.com/lists/oss-security/2016/05/25/2 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/90865 http://www.securitytracker.com/id/1036348 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722 http://www.ubuntu.com/usn/USN-2994-1 http://xmlsoft.org/news.html https://access.redhat.com/errata/RHSA-2016:1292 https://access.redhat.com/security/cve/CVE-2016-4449 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449 https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709 https://kc.mcafee.com/corporate/index?page=content&id=SB10170 https://linux.oracle.com/cve/CVE-2016-4449.html https://linux.oracle.com/errata/ELSA-2016-1292.html https://support.apple.com/HT206899 https://support.apple.com/HT206901 https://support.apple.com/HT206902 https://support.apple.com/HT206903 https://support.apple.com/HT206904 https://support.apple.com/HT206905 https://support.cybozu.com/ja-jp/article/9735 https://ubuntu.com/security/notices/USN-2994-1 https://www.debian.org/security/2016/dsa-3593 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-4483 |
LOW |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.8 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.debian.org/security/2016/dsa-3593 http://www.openwall.com/lists/oss-security/2016/05/03/8 http://www.openwall.com/lists/oss-security/2016/05/04/7 http://www.openwall.com/lists/oss-security/2016/06/07/4 http://www.openwall.com/lists/oss-security/2016/06/07/5 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/90013 http://www.securitytracker.com/id/1036348 https://access.redhat.com/security/cve/CVE-2016-4483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483 https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-37 https://ubuntu.com/security/notices/USN-2994-1 https://www.tenable.com/security/tns-2016-18
|
libxml2 |
CVE-2016-9318 |
LOW |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.13 |
Expand...http://www.securityfocus.com/bid/94347 https://access.redhat.com/security/cve/CVE-2016-9318 https://bugzilla.gnome.org/show_bug.cgi?id=772726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318 https://github.com/lsh123/xmlsec/issues/43 https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3739-1 https://ubuntu.com/security/notices/USN-3739-2 https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/3739-2/
|
libxml2 |
CVE-2017-16932 |
LOW |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.11 |
Expand...http://xmlsoft.org/news.html https://access.redhat.com/security/cve/CVE-2017-16932 https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html https://bugzilla.gnome.org/show_bug.cgi?id=759579 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932 https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961 https://github.com/sparklemotion/nokogiri/issues/1714 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html https://ubuntu.com/security/notices/USN-3504-1 https://ubuntu.com/security/notices/USN-3504-2 https://ubuntu.com/security/notices/USN-3739-1 https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/usn/usn-3504-1/
|
libxml2 |
CVE-2017-18258 |
LOW |
2.9.1+dfsg1-3ubuntu4.7 |
2.9.1+dfsg1-3ubuntu4.13 |
Expand...https://access.redhat.com/security/cve/CVE-2017-18258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258 https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb https://github.com/advisories/GHSA-882p-jqgm-f45g https://kc.mcafee.com/corporate/index?page=content&id=SB10284 https://linux.oracle.com/cve/CVE-2017-18258.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://nvd.nist.gov/vuln/detail/CVE-2017-18258 https://security.netapp.com/advisory/ntap-20190719-0001/ https://ubuntu.com/security/notices/USN-3739-1 https://usn.ubuntu.com/3739-1/
|
login |
CVE-2016-6252 |
MEDIUM |
1:4.1.5.1-1ubuntu9.1 |
1:4.1.5.1-1ubuntu9.4 |
Expand...http://www.debian.org/security/2017/dsa-3793 http://www.openwall.com/lists/oss-security/2016/07/19/6 http://www.openwall.com/lists/oss-security/2016/07/19/7 http://www.openwall.com/lists/oss-security/2016/07/20/2 http://www.openwall.com/lists/oss-security/2016/07/25/7 http://www.securityfocus.com/bid/92055 https://access.redhat.com/security/cve/CVE-2016-6252 https://bugzilla.suse.com/show_bug.cgi?id=979282 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252 https://github.com/shadow-maint/shadow/issues/27 https://security.gentoo.org/glsa/201706-02 https://ubuntu.com/security/notices/USN-3276-1
|
login |
CVE-2017-2616 |
MEDIUM |
1:4.1.5.1-1ubuntu9.1 |
1:4.1.5.1-1ubuntu9.4 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-0654.html http://www.securityfocus.com/bid/96404 http://www.securitytracker.com/id/1038271 https://access.redhat.com/errata/RHSA-2017:0907 https://access.redhat.com/security/cve/CVE-2017-2616 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616 https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891 https://linux.oracle.com/cve/CVE-2017-2616.html https://linux.oracle.com/errata/ELSA-2017-0907.html https://security.gentoo.org/glsa/201706-02 https://ubuntu.com/security/notices/USN-3276-1 https://ubuntu.com/security/notices/USN-3276-3 https://www.debian.org/security/2017/dsa-3793
|
multiarch-support |
CVE-2015-7547 |
HIGH |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.7 |
Expand...http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html http://marc.info/?l=bugtraq&m=145596041017029&w=2 http://marc.info/?l=bugtraq&m=145672440608228&w=2 http://marc.info/?l=bugtraq&m=145690841819314&w=2 http://marc.info/?l=bugtraq&m=145857691004892&w=2 http://marc.info/?l=bugtraq&m=146161017210491&w=2 http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html http://rhn.redhat.com/errata/RHSA-2016-0175.html http://rhn.redhat.com/errata/RHSA-2016-0176.html http://rhn.redhat.com/errata/RHSA-2016-0225.html http://rhn.redhat.com/errata/RHSA-2016-0277.html http://seclists.org/fulldisclosure/2019/Sep/7 http://seclists.org/fulldisclosure/2021/Sep/0 http://support.citrix.com/article/CTX206991 http://ubuntu.com/usn/usn-2900-1 http://www.debian.org/security/2016/dsa-3480 http://www.debian.org/security/2016/dsa-3481 http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html http://www.securityfocus.com/bid/83265 http://www.securitytracker.com/id/1035020 http://www.vmware.com/security/advisories/VMSA-2016-0002.html https://access.redhat.com/articles/2161461 https://access.redhat.com/security/cve/CVE-2015-7547 https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/ https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ https://bto.bluecoat.com/security-advisory/sa114 https://bugzilla.redhat.com/show_bug.cgi?id=1293532 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547 https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161 https://kc.mcafee.com/corporate/index?page=content&id=SB10150 https://linux.oracle.com/cve/CVE-2015-7547.html https://linux.oracle.com/errata/ELSA-2016-0176.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201602-02 https://security.netapp.com/advisory/ntap-20160217-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=18665 https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html https://support.lenovo.com/us/en/product_security/len_5450 https://ubuntu.com/security/notices/USN-2900-1 https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17 https://www.exploit-db.com/exploits/39454/ https://www.exploit-db.com/exploits/40339/ https://www.kb.cert.org/vuls/id/457759 https://www.tenable.com/security/research/tra-2017-08
|
multiarch-support |
CVE-2018-1000001 |
HIGH |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://seclists.org/oss-sec/2018/q1/38 http://www.openwall.com/lists/oss-security/2018/01/11/5 http://www.securityfocus.com/bid/102525 http://www.securitytracker.com/id/1040162 https://access.redhat.com/errata/RHSA-2018:0805 https://access.redhat.com/security/cve/CVE-2018-1000001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001 https://linux.oracle.com/cve/CVE-2018-1000001.html https://linux.oracle.com/errata/ELSA-2018-0805.html https://lists.samba.org/archive/rsync/2018-February/031478.html https://security.netapp.com/advisory/ntap-20190404-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=18203 https://ubuntu.com/security/notices/USN-3534-1 https://ubuntu.com/security/notices/USN-3536-1 https://usn.ubuntu.com/3534-1/ https://usn.ubuntu.com/3536-1/ https://www.exploit-db.com/exploits/43775/ https://www.exploit-db.com/exploits/44889/ https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
|
multiarch-support |
CVE-2015-5277 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://rhn.redhat.com/errata/RHSA-2015-2172.html http://seclists.org/fulldisclosure/2019/Sep/7 http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securityfocus.com/bid/78092 http://www.securitytracker.com/id/1034196 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/security/cve/CVE-2015-5277 https://bugzilla.redhat.com/show_bug.cgi?id=1262914 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277 https://linux.oracle.com/cve/CVE-2015-5277.html https://linux.oracle.com/errata/ELSA-2015-2172.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=17079 https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html https://ubuntu.com/security/notices/USN-2985-1
|
multiarch-support |
CVE-2015-8982 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://openwall.com/lists/oss-security/2015/09/08/2 http://www.openwall.com/lists/oss-security/2015/02/13/3 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72602 https://access.redhat.com/security/cve/CVE-2015-8982 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://sourceware.org/bugzilla/show_bug.cgi?id=16009 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed https://ubuntu.com/security/notices/USN-3239-1
|
multiarch-support |
CVE-2015-8983 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72740 https://access.redhat.com/security/cve/CVE-2015-8983 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983 https://sourceware.org/bugzilla/show_bug.cgi?id=17269 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
multiarch-support |
CVE-2015-8984 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72789 https://access.redhat.com/security/cve/CVE-2015-8984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984 https://sourceware.org/bugzilla/show_bug.cgi?id=18032 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
multiarch-support |
CVE-2016-2856 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403 http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/ http://www.openwall.com/lists/oss-security/2016/02/23/3 http://www.openwall.com/lists/oss-security/2016/03/07/2 http://www.securityfocus.com/bid/84601 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856 https://ubuntu.com/security/notices/USN-2985-1
|
multiarch-support |
CVE-2017-1000366 |
MEDIUM |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.13 |
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://seclists.org/fulldisclosure/2019/Sep/7 http://www.debian.org/security/2017/dsa-3887 http://www.securityfocus.com/bid/99127 http://www.securitytracker.com/id/1038712 https://access.redhat.com/errata/RHSA-2017:1479 https://access.redhat.com/errata/RHSA-2017:1480 https://access.redhat.com/errata/RHSA-2017:1481 https://access.redhat.com/errata/RHSA-2017:1567 https://access.redhat.com/errata/RHSA-2017:1712 https://access.redhat.com/security/cve/CVE-2017-1000366 https://access.redhat.com/security/vulnerabilities/stackguard https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366 https://kc.mcafee.com/corporate/index?page=content&id=SB10205 https://linux.oracle.com/cve/CVE-2017-1000366.html https://linux.oracle.com/errata/ELSA-2017-1481.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201706-19 https://ubuntu.com/security/notices/USN-3323-1 https://ubuntu.com/security/notices/USN-3323-2 https://www.exploit-db.com/exploits/42274/ https://www.exploit-db.com/exploits/42275/ https://www.exploit-db.com/exploits/42276/ https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt https://www.suse.com/security/cve/CVE-2017-1000366/ https://www.suse.com/support/kb/doc/?id=7020973
|
multiarch-support |
CVE-2013-2207 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://secunia.com/advisories/55113 http://www.mandriva.com/security/advisories?name=MDVSA-2013:283 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/security/cve/CVE-2013-2207 https://bugzilla.redhat.com/show_bug.cgi?id=976408 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207 https://security.gentoo.org/glsa/201503-04 https://sourceware.org/bugzilla/show_bug.cgi?id=15755 https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html https://ubuntu.com/security/notices/USN-2985-1
|
multiarch-support |
CVE-2014-8121 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://rhn.redhat.com/errata/RHSA-2015-0327.html http://www.debian.org/security/2016/dsa-3480 http://www.securityfocus.com/bid/73038 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/security/cve/CVE-2014-8121 https://bugzilla.redhat.com/show_bug.cgi?id=1165192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121 https://linux.oracle.com/cve/CVE-2014-8121.html https://linux.oracle.com/errata/ELSA-2015-0327.html https://security.gentoo.org/glsa/201602-02 https://sourceware.org/ml/libc-alpha/2015-02/msg00617.html https://ubuntu.com/security/notices/USN-2985-1
|
multiarch-support |
CVE-2015-1781 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://www.debian.org/security/2016/dsa-3480 http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securityfocus.com/bid/74255 http://www.securitytracker.com/id/1032178 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/security/cve/CVE-2015-1781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781 https://linux.oracle.com/cve/CVE-2015-1781.html https://linux.oracle.com/errata/ELSA-2015-2199.html https://rhn.redhat.com/errata/RHSA-2015-0863.html https://security.gentoo.org/glsa/201602-02 https://sourceware.org/bugzilla/show_bug.cgi?id=18287 https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386 https://ubuntu.com/security/notices/USN-2985-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
multiarch-support |
CVE-2015-8776 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html http://rhn.redhat.com/errata/RHSA-2017-0680.html http://www.debian.org/security/2016/dsa-3480 http://www.debian.org/security/2016/dsa-3481 http://www.openwall.com/lists/oss-security/2016/01/19/11 http://www.openwall.com/lists/oss-security/2016/01/20/1 http://www.securityfocus.com/bid/83277 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/errata/RHSA-2017:1916 https://access.redhat.com/security/cve/CVE-2015-8776 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776 https://linux.oracle.com/cve/CVE-2015-8776.html https://linux.oracle.com/errata/ELSA-2017-1916.html https://security.gentoo.org/glsa/201602-02 https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=18985 https://ubuntu.com/security/notices/USN-2985-1 https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
|
multiarch-support |
CVE-2015-8777 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://www.debian.org/security/2016/dsa-3480 http://www.openwall.com/lists/oss-security/2015/09/05/8 http://www.openwall.com/lists/oss-security/2016/01/20/1 http://www.securityfocus.com/bid/81469 http://www.securitytracker.com/id/1034811 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/errata/RHSA-2017:1916 https://access.redhat.com/security/cve/CVE-2015-8777 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777 https://linux.oracle.com/cve/CVE-2015-8777.html https://linux.oracle.com/errata/ELSA-2017-1916.html https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=18928 https://ubuntu.com/security/notices/USN-2985-1
|
multiarch-support |
CVE-2015-8778 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://rhn.redhat.com/errata/RHSA-2017-0680.html http://seclists.org/fulldisclosure/2019/Sep/7 http://www.debian.org/security/2016/dsa-3480 http://www.debian.org/security/2016/dsa-3481 http://www.openwall.com/lists/oss-security/2016/01/19/11 http://www.openwall.com/lists/oss-security/2016/01/20/1 http://www.securityfocus.com/bid/83275 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/errata/RHSA-2017:1916 https://access.redhat.com/security/cve/CVE-2015-8778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778 https://linux.oracle.com/cve/CVE-2015-8778.html https://linux.oracle.com/errata/ELSA-2017-1916.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201602-02 https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=18240 https://ubuntu.com/security/notices/USN-2985-1 https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
|
multiarch-support |
CVE-2015-8779 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://rhn.redhat.com/errata/RHSA-2017-0680.html http://seclists.org/fulldisclosure/2019/Sep/7 http://www.debian.org/security/2016/dsa-3480 http://www.debian.org/security/2016/dsa-3481 http://www.openwall.com/lists/oss-security/2016/01/19/11 http://www.openwall.com/lists/oss-security/2016/01/20/1 http://www.securityfocus.com/bid/82244 http://www.ubuntu.com/usn/USN-2985-1 http://www.ubuntu.com/usn/USN-2985-2 https://access.redhat.com/errata/RHSA-2017:1916 https://access.redhat.com/security/cve/CVE-2015-8779 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779 https://linux.oracle.com/cve/CVE-2015-8779.html https://linux.oracle.com/errata/ELSA-2017-1916.html https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201602-02 https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=17905 https://ubuntu.com/security/notices/USN-2985-1 https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
|
multiarch-support |
CVE-2016-1234 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html http://seclists.org/fulldisclosure/2021/Sep/0 http://www.openwall.com/lists/oss-security/2016/03/07/16 http://www.securityfocus.com/bid/84204 https://access.redhat.com/security/cve/CVE-2016-1234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=19779 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea https://ubuntu.com/security/notices/USN-3239-1
|
multiarch-support |
CVE-2016-3075 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.8 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://rhn.redhat.com/errata/RHSA-2016-2573.html http://www.securityfocus.com/bid/85732 http://www.ubuntu.com/usn/USN-2985-1 https://access.redhat.com/security/cve/CVE-2016-3075 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075 https://linux.oracle.com/cve/CVE-2016-3075.html https://linux.oracle.com/errata/ELSA-2016-3638.html https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=19879 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=317b199b4aff8cfa27f2302ab404d2bb5032b9a4 https://ubuntu.com/security/notices/USN-2985-1
|
multiarch-support |
CVE-2016-3706 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.securityfocus.com/bid/102073 http://www.securityfocus.com/bid/88440 https://access.redhat.com/security/cve/CVE-2016-3706 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706 https://source.android.com/security/bulletin/2017-12-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20010 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9 https://ubuntu.com/security/notices/USN-3239-1 https://ubuntu.com/security/notices/USN-3239-3
|
multiarch-support |
CVE-2016-4429 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.securityfocus.com/bid/102073 https://access.redhat.com/security/cve/CVE-2016-4429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429 https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html https://source.android.com/security/bulletin/2017-12-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20112 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c https://ubuntu.com/security/notices/USN-3239-1 https://ubuntu.com/security/notices/USN-3759-1 https://ubuntu.com/security/notices/USN-3759-2 https://usn.ubuntu.com/3759-1/ https://usn.ubuntu.com/3759-2/
|
multiarch-support |
CVE-2016-6323 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.10 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-10/msg00009.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.openwall.com/lists/oss-security/2016/08/18/12 http://www.securityfocus.com/bid/92532 https://access.redhat.com/security/cve/CVE-2016-6323 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KTXSOVCRDGBIB4WCIDAGYYUBESXZ4IGK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVWSAZVBTLALXF4SCBPDV3FY6J22DXLZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WO7IMEYWZ2WTXGGMZBWWSDCUMFN63XOB/ https://security.gentoo.org/glsa/201706-19 https://sourceware.org/bugzilla/show_bug.cgi?id=20435 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=9e2ff6c9cc54c0b4402b8d49e4abe7000fde7617 https://ubuntu.com/security/notices/USN-3239-1
|
multiarch-support |
CVE-2017-1000408 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://seclists.org/oss-sec/2017/q4/385 http://www.openwall.com/lists/oss-security/2017/12/11/4 http://www.openwall.com/lists/oss-security/2019/06/27/7 http://www.openwall.com/lists/oss-security/2019/06/28/1 http://www.openwall.com/lists/oss-security/2019/06/28/2 https://access.redhat.com/security/cve/CVE-2017-1000408 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408 https://security.netapp.com/advisory/ntap-20190404-0003/ https://ubuntu.com/security/notices/USN-3534-1 https://www.exploit-db.com/exploits/43331/
|
multiarch-support |
CVE-2017-1000409 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://seclists.org/oss-sec/2017/q4/385 http://www.openwall.com/lists/oss-security/2017/12/11/4 https://access.redhat.com/security/cve/CVE-2017-1000409 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409 https://security.netapp.com/advisory/ntap-20190404-0003/ https://ubuntu.com/security/notices/USN-3534-1 https://www.exploit-db.com/exploits/43331/
|
multiarch-support |
CVE-2017-15670 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://www.securityfocus.com/bid/101521 https://access.redhat.com/errata/RHSA-2018:0805 https://access.redhat.com/errata/RHSA-2018:1879 https://access.redhat.com/security/cve/CVE-2017-15670 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670 https://linux.oracle.com/cve/CVE-2017-15670.html https://linux.oracle.com/errata/ELSA-2018-1879.html https://sourceware.org/bugzilla/show_bug.cgi?id=22320 https://ubuntu.com/security/notices/USN-3534-1
|
multiarch-support |
CVE-2017-15804 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://www.securityfocus.com/bid/101535 https://access.redhat.com/errata/RHSA-2018:0805 https://access.redhat.com/errata/RHSA-2018:1879 https://access.redhat.com/security/cve/CVE-2017-15804 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804 https://linux.oracle.com/cve/CVE-2017-15804.html https://linux.oracle.com/errata/ELSA-2018-1879.html https://sourceware.org/bugzilla/show_bug.cgi?id=22332 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8 https://ubuntu.com/security/notices/USN-3534-1
|
multiarch-support |
CVE-2017-16997 |
LOW |
2.19-0ubuntu6.6 |
2.19-0ubuntu6.14 |
Expand...http://www.securityfocus.com/bid/102228 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3092 https://access.redhat.com/security/cve/CVE-2017-16997 https://bugs.debian.org/884615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997 https://linux.oracle.com/cve/CVE-2017-16997.html https://linux.oracle.com/errata/ELSA-2018-3092.html https://sourceware.org/bugzilla/show_bug.cgi?id=22625 https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html https://ubuntu.com/security/notices/USN-3534-1
|
mysql-client-5.5 |
CVE-2016-0640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86427 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640 https://linux.oracle.com/cve/CVE-2016-0640.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-client-5.5 |
CVE-2016-0641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86470 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641 https://linux.oracle.com/cve/CVE-2016-0641.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-client-5.5 |
CVE-2016-0642 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3557 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86445 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0642 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642 https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-client-5.5 |
CVE-2016-0643 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86486 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0643 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643 https://linux.oracle.com/cve/CVE-2016-0643.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-client-5.5 |
CVE-2016-0644 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86442 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0644 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644 https://linux.oracle.com/cve/CVE-2016-0644.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-client-5.5 |
CVE-2016-0646 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86436 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0646 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646 https://linux.oracle.com/cve/CVE-2016-0646.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-client-5.5 |
CVE-2016-0647 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86495 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647 https://linux.oracle.com/cve/CVE-2016-0647.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-client-5.5 |
CVE-2016-0648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86457 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648 https://linux.oracle.com/cve/CVE-2016-0648.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-client-5.5 |
CVE-2016-0649 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86498 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0649 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649 https://linux.oracle.com/cve/CVE-2016-0649.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-client-5.5 |
CVE-2016-0650 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86496 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0650 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650 https://linux.oracle.com/cve/CVE-2016-0650.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-client-5.5 |
CVE-2016-0666 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86509 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666 https://linux.oracle.com/cve/CVE-2016-0666.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-client-5.5 |
CVE-2016-2047 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://marc.info/?l=oss-security&m=145379584107459&w=2 http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3453 http://www.debian.org/security/2016/dsa-3557 http://www.openwall.com/lists/oss-security/2016/01/26/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/81810 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-2047 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047 https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41 https://linux.oracle.com/cve/CVE-2016-2047.html https://linux.oracle.com/errata/ELSA-2016-0534.html https://mariadb.atlassian.net/browse/MDEV-9212 https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/ https://mariadb.com/kb/en/mdb-10023-rn/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-client-5.5 |
CVE-2016-3477 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91902 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477 https://linux.oracle.com/cve/CVE-2016-3477.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-client-5.5 |
CVE-2016-3492 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93650 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-3492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492 https://linux.oracle.com/cve/CVE-2016-3492.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-client-5.5 |
CVE-2016-3521 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91932 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3521 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521 https://linux.oracle.com/cve/CVE-2016-3521.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-client-5.5 |
CVE-2016-3615 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91960 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615 https://linux.oracle.com/cve/CVE-2016-3615.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-client-5.5 |
CVE-2016-5440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91953 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-5440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440 https://linux.oracle.com/cve/CVE-2016-5440.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-client-5.5 |
CVE-2016-5584 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93735 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5584 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3109-1
|
mysql-client-5.5 |
CVE-2016-5612 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93630 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5612 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612 https://linux.oracle.com/cve/CVE-2016-5612.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://security.gentoo.org/glsa/201701-01
|
mysql-client-5.5 |
CVE-2016-5624 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93635 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624 https://linux.oracle.com/cve/CVE-2016-5624.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
|
mysql-client-5.5 |
CVE-2016-5626 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93638 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5626 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626 https://linux.oracle.com/cve/CVE-2016-5626.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-client-5.5 |
CVE-2016-5629 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93668 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629 https://linux.oracle.com/cve/CVE-2016-5629.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-client-5.5 |
CVE-2016-6662 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html http://rhn.redhat.com/errata/RHSA-2016-2058.html http://rhn.redhat.com/errata/RHSA-2016-2059.html http://rhn.redhat.com/errata/RHSA-2016-2060.html http://rhn.redhat.com/errata/RHSA-2016-2061.html http://rhn.redhat.com/errata/RHSA-2016-2062.html http://rhn.redhat.com/errata/RHSA-2016-2077.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Sep/23 http://www.debian.org/security/2016/dsa-3666 http://www.openwall.com/lists/oss-security/2016/09/12/3 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92912 http://www.securitytracker.com/id/1036769 https://access.redhat.com/security/cve/CVE-2016-6662 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662 https://jira.mariadb.org/browse/MDEV-10465 https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt https://linux.oracle.com/cve/CVE-2016-6662.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3078-1 https://www.exploit-db.com/exploits/40360/ https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
|
mysql-client-5.5 |
CVE-2016-6663 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.openwall.com/lists/oss-security/2016/10/25/4 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92911 http://www.securityfocus.com/bid/93614 https://access.redhat.com/security/cve/CVE-2016-6663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663 https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805 https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291 https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6663.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://www.exploit-db.com/exploits/40678/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
mysql-client-5.5 |
CVE-2016-6664 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.securityfocus.com/archive/1/539695/100/0/threaded http://www.securityfocus.com/bid/93612 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2016-6664 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664 https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6664.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://nvd.nist.gov/vuln/detail/CVE-2016-6664 https://security.gentoo.org/glsa/201702-18 https://www.exploit-db.com/exploits/40679/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
mysql-client-5.5 |
CVE-2016-7440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93659 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-7440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://ubuntu.com/security/notices/USN-3109-1 https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
|
mysql-client-5.5 |
CVE-2016-8283 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93737 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-8283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283 https://linux.oracle.com/cve/CVE-2016-8283.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-client-5.5 |
CVE-2017-10268 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101390 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10268 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268 https://linux.oracle.com/cve/CVE-2017-10268.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2017-10378 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101375 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378 https://linux.oracle.com/cve/CVE-2017-10378.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2017-10379 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101415 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10379 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379 https://linux.oracle.com/cve/CVE-2017-10379.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
mysql-client-5.5 |
CVE-2017-10384 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101406 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384 https://linux.oracle.com/cve/CVE-2017-10384.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
mysql-client-5.5 |
CVE-2017-3238 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95571 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238 https://linux.oracle.com/cve/CVE-2017-3238.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-5.5 |
CVE-2017-3243 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95538 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3243 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243 https://linux.oracle.com/cve/CVE-2017-3243.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-5.5 |
CVE-2017-3244 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95565 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3244 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244 https://linux.oracle.com/cve/CVE-2017-3244.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-5.5 |
CVE-2017-3258 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95560 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258 https://linux.oracle.com/cve/CVE-2017-3258.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-5.5 |
CVE-2017-3265 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95520 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3265 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265 https://linux.oracle.com/cve/CVE-2017-3265.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-5.5 |
CVE-2017-3291 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95501 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291 https://linux.oracle.com/cve/CVE-2017-3291.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-5.5 |
CVE-2017-3305 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://riddle.link/ http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/03/17/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97023 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/security/cve/CVE-2017-3305 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3308 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97725 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3308.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3309 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97742 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3309 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3309.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3312 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95491 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3312 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312 https://linux.oracle.com/cve/CVE-2017-3312.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-5.5 |
CVE-2017-3313 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3809 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95527 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3313 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313 https://linux.oracle.com/cve/CVE-2017-3313.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-5.5 |
CVE-2017-3317 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95585 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3317 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317 https://linux.oracle.com/cve/CVE-2017-3317.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-5.5 |
CVE-2017-3318 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95588 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318 https://linux.oracle.com/cve/CVE-2017-3318.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-5.5 |
CVE-2017-3329 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97763 http://www.securitytracker.com/id/1038287 https://access.redhat.com/security/cve/CVE-2017-3329 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3453 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97776 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3453 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453 https://linux.oracle.com/cve/CVE-2017-3453.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3456 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97831 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3456 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456 https://linux.oracle.com/cve/CVE-2017-3456.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3461 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97812 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3462 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97851 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3463 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97849 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3463 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3464 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97818 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3464 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464 https://linux.oracle.com/cve/CVE-2017-3464.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3600 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97765 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3600 https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/ https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600 https://linux.oracle.com/cve/CVE-2017-3600.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3635 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99730 http://www.securitytracker.com/id/1038928 https://access.redhat.com/security/cve/CVE-2017-3635 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3636 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99736 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3636 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636 https://linux.oracle.com/cve/CVE-2017-3636.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-client-5.5 |
CVE-2017-3641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99767 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641 https://linux.oracle.com/cve/CVE-2017-3641.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-client-5.5 |
CVE-2017-3648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99789 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3651 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99802 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651 https://linux.oracle.com/cve/CVE-2017-3651.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3652 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99805 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3652 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-5.5 |
CVE-2017-3653 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99810 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3653 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653 https://linux.oracle.com/cve/CVE-2017-3653.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-client-5.5 |
CVE-2018-2562 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102713 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562 https://linux.oracle.com/cve/CVE-2018-2562.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-2622 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102706 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622 https://linux.oracle.com/cve/CVE-2018-2622.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-2640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102678 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640 https://linux.oracle.com/cve/CVE-2018-2640.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-2665 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102681 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2665 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665 https://linux.oracle.com/cve/CVE-2018-2665.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-2668 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102682 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2668 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668 https://linux.oracle.com/cve/CVE-2018-2668.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-2755 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103807 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755 https://linux.oracle.com/cve/CVE-2018-2755.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-2761 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103820 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2761 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761 https://linux.oracle.com/cve/CVE-2018-2761.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-2767 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/103954 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2018-2767 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767 https://linux.oracle.com/cve/CVE-2018-2767.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-2771 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103828 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2771 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771 https://linux.oracle.com/cve/CVE-2018-2771.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-2773 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103811 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
mysql-client-5.5 |
CVE-2018-2781 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103825 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781 https://linux.oracle.com/cve/CVE-2018-2781.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-2813 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103830 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813 https://linux.oracle.com/cve/CVE-2018-2813.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-2817 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103818 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2817 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817 https://linux.oracle.com/cve/CVE-2018-2817.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-2818 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103824 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2818 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
mysql-client-5.5 |
CVE-2018-2819 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103814 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819 https://linux.oracle.com/cve/CVE-2018-2819.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-3058 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3058 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058 https://linux.oracle.com/cve/CVE-2018-3058.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-3063 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104786 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3063 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063 https://linux.oracle.com/cve/CVE-2018-3063.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-3066 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3066 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066 https://linux.oracle.com/cve/CVE-2018-3066.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-3070 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-3070 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/
|
mysql-client-5.5 |
CVE-2018-3081 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104779 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081 https://linux.oracle.com/cve/CVE-2018-3081.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-client-5.5 |
CVE-2018-3133 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3133 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-client-5.5 |
CVE-2018-3174 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105612 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3174 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-client-5.5 |
CVE-2018-3282 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3282 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282 https://linux.oracle.com/cve/CVE-2018-3282.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-client-5.5 |
CVE-2017-3302 |
LOW |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3809 http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/01/28/1 http://www.openwall.com/lists/oss-security/2017/02/11/11 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/96162 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3302 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302 https://linux.oracle.com/cve/CVE-2017-3302.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2016-0640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86427 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640 https://linux.oracle.com/cve/CVE-2016-0640.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-client-core-5.5 |
CVE-2016-0641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86470 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641 https://linux.oracle.com/cve/CVE-2016-0641.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-client-core-5.5 |
CVE-2016-0642 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3557 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86445 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0642 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642 https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-client-core-5.5 |
CVE-2016-0643 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86486 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0643 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643 https://linux.oracle.com/cve/CVE-2016-0643.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-client-core-5.5 |
CVE-2016-0644 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86442 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0644 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644 https://linux.oracle.com/cve/CVE-2016-0644.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-client-core-5.5 |
CVE-2016-0646 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86436 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0646 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646 https://linux.oracle.com/cve/CVE-2016-0646.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-client-core-5.5 |
CVE-2016-0647 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86495 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647 https://linux.oracle.com/cve/CVE-2016-0647.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-client-core-5.5 |
CVE-2016-0648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86457 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648 https://linux.oracle.com/cve/CVE-2016-0648.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-client-core-5.5 |
CVE-2016-0649 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86498 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0649 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649 https://linux.oracle.com/cve/CVE-2016-0649.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-client-core-5.5 |
CVE-2016-0650 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86496 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0650 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650 https://linux.oracle.com/cve/CVE-2016-0650.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-client-core-5.5 |
CVE-2016-0666 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86509 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666 https://linux.oracle.com/cve/CVE-2016-0666.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-client-core-5.5 |
CVE-2016-2047 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://marc.info/?l=oss-security&m=145379584107459&w=2 http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3453 http://www.debian.org/security/2016/dsa-3557 http://www.openwall.com/lists/oss-security/2016/01/26/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/81810 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-2047 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047 https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41 https://linux.oracle.com/cve/CVE-2016-2047.html https://linux.oracle.com/errata/ELSA-2016-0534.html https://mariadb.atlassian.net/browse/MDEV-9212 https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/ https://mariadb.com/kb/en/mdb-10023-rn/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-client-core-5.5 |
CVE-2016-3477 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91902 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477 https://linux.oracle.com/cve/CVE-2016-3477.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-client-core-5.5 |
CVE-2016-3492 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93650 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-3492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492 https://linux.oracle.com/cve/CVE-2016-3492.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-client-core-5.5 |
CVE-2016-3521 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91932 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3521 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521 https://linux.oracle.com/cve/CVE-2016-3521.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-client-core-5.5 |
CVE-2016-3615 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91960 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615 https://linux.oracle.com/cve/CVE-2016-3615.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-client-core-5.5 |
CVE-2016-5440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91953 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-5440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440 https://linux.oracle.com/cve/CVE-2016-5440.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-client-core-5.5 |
CVE-2016-5584 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93735 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5584 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3109-1
|
mysql-client-core-5.5 |
CVE-2016-5612 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93630 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5612 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612 https://linux.oracle.com/cve/CVE-2016-5612.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://security.gentoo.org/glsa/201701-01
|
mysql-client-core-5.5 |
CVE-2016-5624 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93635 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624 https://linux.oracle.com/cve/CVE-2016-5624.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
|
mysql-client-core-5.5 |
CVE-2016-5626 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93638 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5626 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626 https://linux.oracle.com/cve/CVE-2016-5626.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-client-core-5.5 |
CVE-2016-5629 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93668 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629 https://linux.oracle.com/cve/CVE-2016-5629.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-client-core-5.5 |
CVE-2016-6662 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html http://rhn.redhat.com/errata/RHSA-2016-2058.html http://rhn.redhat.com/errata/RHSA-2016-2059.html http://rhn.redhat.com/errata/RHSA-2016-2060.html http://rhn.redhat.com/errata/RHSA-2016-2061.html http://rhn.redhat.com/errata/RHSA-2016-2062.html http://rhn.redhat.com/errata/RHSA-2016-2077.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Sep/23 http://www.debian.org/security/2016/dsa-3666 http://www.openwall.com/lists/oss-security/2016/09/12/3 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92912 http://www.securitytracker.com/id/1036769 https://access.redhat.com/security/cve/CVE-2016-6662 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662 https://jira.mariadb.org/browse/MDEV-10465 https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt https://linux.oracle.com/cve/CVE-2016-6662.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3078-1 https://www.exploit-db.com/exploits/40360/ https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
|
mysql-client-core-5.5 |
CVE-2016-6663 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.openwall.com/lists/oss-security/2016/10/25/4 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92911 http://www.securityfocus.com/bid/93614 https://access.redhat.com/security/cve/CVE-2016-6663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663 https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805 https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291 https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6663.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://www.exploit-db.com/exploits/40678/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
mysql-client-core-5.5 |
CVE-2016-6664 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.securityfocus.com/archive/1/539695/100/0/threaded http://www.securityfocus.com/bid/93612 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2016-6664 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664 https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6664.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://nvd.nist.gov/vuln/detail/CVE-2016-6664 https://security.gentoo.org/glsa/201702-18 https://www.exploit-db.com/exploits/40679/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
mysql-client-core-5.5 |
CVE-2016-7440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93659 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-7440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://ubuntu.com/security/notices/USN-3109-1 https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
|
mysql-client-core-5.5 |
CVE-2016-8283 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93737 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-8283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283 https://linux.oracle.com/cve/CVE-2016-8283.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-client-core-5.5 |
CVE-2017-10268 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101390 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10268 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268 https://linux.oracle.com/cve/CVE-2017-10268.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2017-10378 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101375 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378 https://linux.oracle.com/cve/CVE-2017-10378.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2017-10379 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101415 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10379 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379 https://linux.oracle.com/cve/CVE-2017-10379.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
mysql-client-core-5.5 |
CVE-2017-10384 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101406 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384 https://linux.oracle.com/cve/CVE-2017-10384.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
mysql-client-core-5.5 |
CVE-2017-3238 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95571 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238 https://linux.oracle.com/cve/CVE-2017-3238.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-core-5.5 |
CVE-2017-3243 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95538 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3243 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243 https://linux.oracle.com/cve/CVE-2017-3243.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-core-5.5 |
CVE-2017-3244 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95565 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3244 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244 https://linux.oracle.com/cve/CVE-2017-3244.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-core-5.5 |
CVE-2017-3258 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95560 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258 https://linux.oracle.com/cve/CVE-2017-3258.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-core-5.5 |
CVE-2017-3265 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95520 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3265 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265 https://linux.oracle.com/cve/CVE-2017-3265.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-core-5.5 |
CVE-2017-3291 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95501 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291 https://linux.oracle.com/cve/CVE-2017-3291.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-core-5.5 |
CVE-2017-3305 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://riddle.link/ http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/03/17/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97023 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/security/cve/CVE-2017-3305 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3308 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97725 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3308.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3309 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97742 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3309 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3309.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3312 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95491 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3312 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312 https://linux.oracle.com/cve/CVE-2017-3312.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-core-5.5 |
CVE-2017-3313 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3809 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95527 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3313 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313 https://linux.oracle.com/cve/CVE-2017-3313.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-core-5.5 |
CVE-2017-3317 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95585 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3317 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317 https://linux.oracle.com/cve/CVE-2017-3317.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-core-5.5 |
CVE-2017-3318 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95588 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318 https://linux.oracle.com/cve/CVE-2017-3318.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-client-core-5.5 |
CVE-2017-3329 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97763 http://www.securitytracker.com/id/1038287 https://access.redhat.com/security/cve/CVE-2017-3329 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3453 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97776 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3453 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453 https://linux.oracle.com/cve/CVE-2017-3453.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3456 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97831 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3456 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456 https://linux.oracle.com/cve/CVE-2017-3456.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3461 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97812 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3462 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97851 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3463 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97849 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3463 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3464 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97818 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3464 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464 https://linux.oracle.com/cve/CVE-2017-3464.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3600 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97765 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3600 https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/ https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600 https://linux.oracle.com/cve/CVE-2017-3600.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3635 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99730 http://www.securitytracker.com/id/1038928 https://access.redhat.com/security/cve/CVE-2017-3635 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3636 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99736 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3636 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636 https://linux.oracle.com/cve/CVE-2017-3636.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-client-core-5.5 |
CVE-2017-3641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99767 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641 https://linux.oracle.com/cve/CVE-2017-3641.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-client-core-5.5 |
CVE-2017-3648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99789 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3651 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99802 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651 https://linux.oracle.com/cve/CVE-2017-3651.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3652 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99805 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3652 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-client-core-5.5 |
CVE-2017-3653 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99810 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3653 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653 https://linux.oracle.com/cve/CVE-2017-3653.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-client-core-5.5 |
CVE-2018-2562 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102713 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562 https://linux.oracle.com/cve/CVE-2018-2562.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-2622 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102706 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622 https://linux.oracle.com/cve/CVE-2018-2622.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-2640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102678 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640 https://linux.oracle.com/cve/CVE-2018-2640.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-2665 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102681 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2665 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665 https://linux.oracle.com/cve/CVE-2018-2665.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-2668 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102682 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2668 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668 https://linux.oracle.com/cve/CVE-2018-2668.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-2755 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103807 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755 https://linux.oracle.com/cve/CVE-2018-2755.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-2761 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103820 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2761 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761 https://linux.oracle.com/cve/CVE-2018-2761.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-2767 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/103954 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2018-2767 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767 https://linux.oracle.com/cve/CVE-2018-2767.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-2771 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103828 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2771 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771 https://linux.oracle.com/cve/CVE-2018-2771.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-2773 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103811 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
mysql-client-core-5.5 |
CVE-2018-2781 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103825 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781 https://linux.oracle.com/cve/CVE-2018-2781.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-2813 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103830 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813 https://linux.oracle.com/cve/CVE-2018-2813.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-2817 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103818 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2817 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817 https://linux.oracle.com/cve/CVE-2018-2817.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-2818 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103824 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2818 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
mysql-client-core-5.5 |
CVE-2018-2819 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103814 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819 https://linux.oracle.com/cve/CVE-2018-2819.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-3058 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3058 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058 https://linux.oracle.com/cve/CVE-2018-3058.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-3063 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104786 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3063 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063 https://linux.oracle.com/cve/CVE-2018-3063.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-3066 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3066 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066 https://linux.oracle.com/cve/CVE-2018-3066.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-3070 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-3070 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/
|
mysql-client-core-5.5 |
CVE-2018-3081 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104779 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081 https://linux.oracle.com/cve/CVE-2018-3081.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-client-core-5.5 |
CVE-2018-3133 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3133 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-client-core-5.5 |
CVE-2018-3174 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105612 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3174 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-client-core-5.5 |
CVE-2018-3282 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3282 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282 https://linux.oracle.com/cve/CVE-2018-3282.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-client-core-5.5 |
CVE-2017-3302 |
LOW |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3809 http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/01/28/1 http://www.openwall.com/lists/oss-security/2017/02/11/11 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/96162 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3302 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302 https://linux.oracle.com/cve/CVE-2017-3302.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2016-0640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86427 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640 https://linux.oracle.com/cve/CVE-2016-0640.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-common |
CVE-2016-0641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86470 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641 https://linux.oracle.com/cve/CVE-2016-0641.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-common |
CVE-2016-0642 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3557 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86445 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0642 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642 https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-common |
CVE-2016-0643 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86486 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0643 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643 https://linux.oracle.com/cve/CVE-2016-0643.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-common |
CVE-2016-0644 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86442 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0644 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644 https://linux.oracle.com/cve/CVE-2016-0644.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-common |
CVE-2016-0646 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86436 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0646 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646 https://linux.oracle.com/cve/CVE-2016-0646.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-common |
CVE-2016-0647 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86495 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647 https://linux.oracle.com/cve/CVE-2016-0647.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-common |
CVE-2016-0648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86457 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648 https://linux.oracle.com/cve/CVE-2016-0648.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-common |
CVE-2016-0649 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86498 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0649 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649 https://linux.oracle.com/cve/CVE-2016-0649.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-common |
CVE-2016-0650 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86496 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0650 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650 https://linux.oracle.com/cve/CVE-2016-0650.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-common |
CVE-2016-0666 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86509 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666 https://linux.oracle.com/cve/CVE-2016-0666.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-common |
CVE-2016-2047 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://marc.info/?l=oss-security&m=145379584107459&w=2 http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3453 http://www.debian.org/security/2016/dsa-3557 http://www.openwall.com/lists/oss-security/2016/01/26/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/81810 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-2047 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047 https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41 https://linux.oracle.com/cve/CVE-2016-2047.html https://linux.oracle.com/errata/ELSA-2016-0534.html https://mariadb.atlassian.net/browse/MDEV-9212 https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/ https://mariadb.com/kb/en/mdb-10023-rn/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-common |
CVE-2016-3477 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91902 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477 https://linux.oracle.com/cve/CVE-2016-3477.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-common |
CVE-2016-3492 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93650 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-3492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492 https://linux.oracle.com/cve/CVE-2016-3492.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-common |
CVE-2016-3521 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91932 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3521 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521 https://linux.oracle.com/cve/CVE-2016-3521.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-common |
CVE-2016-3615 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91960 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615 https://linux.oracle.com/cve/CVE-2016-3615.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-common |
CVE-2016-5440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91953 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-5440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440 https://linux.oracle.com/cve/CVE-2016-5440.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-common |
CVE-2016-5584 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93735 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5584 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3109-1
|
mysql-common |
CVE-2016-5612 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93630 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5612 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612 https://linux.oracle.com/cve/CVE-2016-5612.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://security.gentoo.org/glsa/201701-01
|
mysql-common |
CVE-2016-5624 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93635 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624 https://linux.oracle.com/cve/CVE-2016-5624.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
|
mysql-common |
CVE-2016-5626 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93638 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5626 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626 https://linux.oracle.com/cve/CVE-2016-5626.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-common |
CVE-2016-5629 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93668 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629 https://linux.oracle.com/cve/CVE-2016-5629.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-common |
CVE-2016-6662 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html http://rhn.redhat.com/errata/RHSA-2016-2058.html http://rhn.redhat.com/errata/RHSA-2016-2059.html http://rhn.redhat.com/errata/RHSA-2016-2060.html http://rhn.redhat.com/errata/RHSA-2016-2061.html http://rhn.redhat.com/errata/RHSA-2016-2062.html http://rhn.redhat.com/errata/RHSA-2016-2077.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Sep/23 http://www.debian.org/security/2016/dsa-3666 http://www.openwall.com/lists/oss-security/2016/09/12/3 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92912 http://www.securitytracker.com/id/1036769 https://access.redhat.com/security/cve/CVE-2016-6662 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662 https://jira.mariadb.org/browse/MDEV-10465 https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt https://linux.oracle.com/cve/CVE-2016-6662.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3078-1 https://www.exploit-db.com/exploits/40360/ https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
|
mysql-common |
CVE-2016-6663 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.openwall.com/lists/oss-security/2016/10/25/4 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92911 http://www.securityfocus.com/bid/93614 https://access.redhat.com/security/cve/CVE-2016-6663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663 https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805 https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291 https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6663.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://www.exploit-db.com/exploits/40678/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
mysql-common |
CVE-2016-6664 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.securityfocus.com/archive/1/539695/100/0/threaded http://www.securityfocus.com/bid/93612 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2016-6664 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664 https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6664.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://nvd.nist.gov/vuln/detail/CVE-2016-6664 https://security.gentoo.org/glsa/201702-18 https://www.exploit-db.com/exploits/40679/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
mysql-common |
CVE-2016-7440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93659 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-7440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://ubuntu.com/security/notices/USN-3109-1 https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
|
mysql-common |
CVE-2016-8283 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93737 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-8283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283 https://linux.oracle.com/cve/CVE-2016-8283.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-common |
CVE-2017-10268 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101390 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10268 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268 https://linux.oracle.com/cve/CVE-2017-10268.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2017-10378 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101375 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378 https://linux.oracle.com/cve/CVE-2017-10378.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2017-10379 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101415 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10379 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379 https://linux.oracle.com/cve/CVE-2017-10379.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
mysql-common |
CVE-2017-10384 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101406 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384 https://linux.oracle.com/cve/CVE-2017-10384.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
mysql-common |
CVE-2017-3238 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95571 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238 https://linux.oracle.com/cve/CVE-2017-3238.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-common |
CVE-2017-3243 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95538 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3243 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243 https://linux.oracle.com/cve/CVE-2017-3243.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-common |
CVE-2017-3244 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95565 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3244 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244 https://linux.oracle.com/cve/CVE-2017-3244.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-common |
CVE-2017-3258 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95560 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258 https://linux.oracle.com/cve/CVE-2017-3258.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-common |
CVE-2017-3265 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95520 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3265 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265 https://linux.oracle.com/cve/CVE-2017-3265.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-common |
CVE-2017-3291 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95501 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291 https://linux.oracle.com/cve/CVE-2017-3291.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-common |
CVE-2017-3305 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://riddle.link/ http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/03/17/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97023 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/security/cve/CVE-2017-3305 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3308 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97725 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3308.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3309 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97742 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3309 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3309.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3312 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95491 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3312 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312 https://linux.oracle.com/cve/CVE-2017-3312.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-common |
CVE-2017-3313 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3809 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95527 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3313 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313 https://linux.oracle.com/cve/CVE-2017-3313.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-common |
CVE-2017-3317 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95585 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3317 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317 https://linux.oracle.com/cve/CVE-2017-3317.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-common |
CVE-2017-3318 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95588 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318 https://linux.oracle.com/cve/CVE-2017-3318.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-common |
CVE-2017-3329 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97763 http://www.securitytracker.com/id/1038287 https://access.redhat.com/security/cve/CVE-2017-3329 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3453 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97776 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3453 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453 https://linux.oracle.com/cve/CVE-2017-3453.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3456 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97831 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3456 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456 https://linux.oracle.com/cve/CVE-2017-3456.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3461 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97812 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3462 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97851 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3463 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97849 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3463 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3464 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97818 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3464 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464 https://linux.oracle.com/cve/CVE-2017-3464.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3600 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97765 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3600 https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/ https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600 https://linux.oracle.com/cve/CVE-2017-3600.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3635 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99730 http://www.securitytracker.com/id/1038928 https://access.redhat.com/security/cve/CVE-2017-3635 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3636 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99736 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3636 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636 https://linux.oracle.com/cve/CVE-2017-3636.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-common |
CVE-2017-3641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99767 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641 https://linux.oracle.com/cve/CVE-2017-3641.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-common |
CVE-2017-3648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99789 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3651 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99802 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651 https://linux.oracle.com/cve/CVE-2017-3651.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3652 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99805 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3652 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-common |
CVE-2017-3653 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99810 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3653 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653 https://linux.oracle.com/cve/CVE-2017-3653.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-common |
CVE-2018-2562 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102713 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562 https://linux.oracle.com/cve/CVE-2018-2562.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-2622 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102706 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622 https://linux.oracle.com/cve/CVE-2018-2622.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-2640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102678 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640 https://linux.oracle.com/cve/CVE-2018-2640.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-2665 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102681 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2665 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665 https://linux.oracle.com/cve/CVE-2018-2665.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-2668 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102682 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2668 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668 https://linux.oracle.com/cve/CVE-2018-2668.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-2755 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103807 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755 https://linux.oracle.com/cve/CVE-2018-2755.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-2761 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103820 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2761 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761 https://linux.oracle.com/cve/CVE-2018-2761.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-2767 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/103954 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2018-2767 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767 https://linux.oracle.com/cve/CVE-2018-2767.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-2771 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103828 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2771 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771 https://linux.oracle.com/cve/CVE-2018-2771.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-2773 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103811 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
mysql-common |
CVE-2018-2781 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103825 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781 https://linux.oracle.com/cve/CVE-2018-2781.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-2813 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103830 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813 https://linux.oracle.com/cve/CVE-2018-2813.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-2817 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103818 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2817 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817 https://linux.oracle.com/cve/CVE-2018-2817.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-2818 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103824 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2818 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
mysql-common |
CVE-2018-2819 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103814 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819 https://linux.oracle.com/cve/CVE-2018-2819.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-3058 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3058 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058 https://linux.oracle.com/cve/CVE-2018-3058.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-3063 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104786 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3063 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063 https://linux.oracle.com/cve/CVE-2018-3063.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-3066 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3066 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066 https://linux.oracle.com/cve/CVE-2018-3066.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-3070 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-3070 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/
|
mysql-common |
CVE-2018-3081 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104779 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081 https://linux.oracle.com/cve/CVE-2018-3081.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-common |
CVE-2018-3133 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3133 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-common |
CVE-2018-3174 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105612 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3174 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-common |
CVE-2018-3282 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3282 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282 https://linux.oracle.com/cve/CVE-2018-3282.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-common |
CVE-2017-3302 |
LOW |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3809 http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/01/28/1 http://www.openwall.com/lists/oss-security/2017/02/11/11 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/96162 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3302 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302 https://linux.oracle.com/cve/CVE-2017-3302.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2016-0640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86427 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640 https://linux.oracle.com/cve/CVE-2016-0640.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server |
CVE-2016-0641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86470 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641 https://linux.oracle.com/cve/CVE-2016-0641.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server |
CVE-2016-0642 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3557 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86445 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0642 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642 https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server |
CVE-2016-0643 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86486 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0643 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643 https://linux.oracle.com/cve/CVE-2016-0643.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server |
CVE-2016-0644 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86442 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0644 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644 https://linux.oracle.com/cve/CVE-2016-0644.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server |
CVE-2016-0646 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86436 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0646 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646 https://linux.oracle.com/cve/CVE-2016-0646.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server |
CVE-2016-0647 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86495 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647 https://linux.oracle.com/cve/CVE-2016-0647.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server |
CVE-2016-0648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86457 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648 https://linux.oracle.com/cve/CVE-2016-0648.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server |
CVE-2016-0649 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86498 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0649 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649 https://linux.oracle.com/cve/CVE-2016-0649.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server |
CVE-2016-0650 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86496 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0650 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650 https://linux.oracle.com/cve/CVE-2016-0650.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server |
CVE-2016-0666 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86509 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666 https://linux.oracle.com/cve/CVE-2016-0666.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server |
CVE-2016-2047 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://marc.info/?l=oss-security&m=145379584107459&w=2 http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3453 http://www.debian.org/security/2016/dsa-3557 http://www.openwall.com/lists/oss-security/2016/01/26/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/81810 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-2047 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047 https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41 https://linux.oracle.com/cve/CVE-2016-2047.html https://linux.oracle.com/errata/ELSA-2016-0534.html https://mariadb.atlassian.net/browse/MDEV-9212 https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/ https://mariadb.com/kb/en/mdb-10023-rn/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server |
CVE-2016-3477 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91902 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477 https://linux.oracle.com/cve/CVE-2016-3477.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-server |
CVE-2016-3492 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93650 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-3492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492 https://linux.oracle.com/cve/CVE-2016-3492.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-server |
CVE-2016-3521 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91932 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3521 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521 https://linux.oracle.com/cve/CVE-2016-3521.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-server |
CVE-2016-3615 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91960 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615 https://linux.oracle.com/cve/CVE-2016-3615.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-server |
CVE-2016-5440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91953 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-5440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440 https://linux.oracle.com/cve/CVE-2016-5440.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-server |
CVE-2016-5584 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93735 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5584 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3109-1
|
mysql-server |
CVE-2016-5612 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93630 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5612 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612 https://linux.oracle.com/cve/CVE-2016-5612.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://security.gentoo.org/glsa/201701-01
|
mysql-server |
CVE-2016-5624 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93635 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624 https://linux.oracle.com/cve/CVE-2016-5624.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
|
mysql-server |
CVE-2016-5626 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93638 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5626 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626 https://linux.oracle.com/cve/CVE-2016-5626.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-server |
CVE-2016-5629 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93668 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629 https://linux.oracle.com/cve/CVE-2016-5629.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-server |
CVE-2016-6662 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html http://rhn.redhat.com/errata/RHSA-2016-2058.html http://rhn.redhat.com/errata/RHSA-2016-2059.html http://rhn.redhat.com/errata/RHSA-2016-2060.html http://rhn.redhat.com/errata/RHSA-2016-2061.html http://rhn.redhat.com/errata/RHSA-2016-2062.html http://rhn.redhat.com/errata/RHSA-2016-2077.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Sep/23 http://www.debian.org/security/2016/dsa-3666 http://www.openwall.com/lists/oss-security/2016/09/12/3 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92912 http://www.securitytracker.com/id/1036769 https://access.redhat.com/security/cve/CVE-2016-6662 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662 https://jira.mariadb.org/browse/MDEV-10465 https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt https://linux.oracle.com/cve/CVE-2016-6662.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3078-1 https://www.exploit-db.com/exploits/40360/ https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
|
mysql-server |
CVE-2016-6663 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.openwall.com/lists/oss-security/2016/10/25/4 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92911 http://www.securityfocus.com/bid/93614 https://access.redhat.com/security/cve/CVE-2016-6663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663 https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805 https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291 https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6663.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://www.exploit-db.com/exploits/40678/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
mysql-server |
CVE-2016-6664 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.securityfocus.com/archive/1/539695/100/0/threaded http://www.securityfocus.com/bid/93612 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2016-6664 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664 https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6664.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://nvd.nist.gov/vuln/detail/CVE-2016-6664 https://security.gentoo.org/glsa/201702-18 https://www.exploit-db.com/exploits/40679/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
mysql-server |
CVE-2016-7440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93659 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-7440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://ubuntu.com/security/notices/USN-3109-1 https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
|
mysql-server |
CVE-2016-8283 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93737 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-8283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283 https://linux.oracle.com/cve/CVE-2016-8283.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-server |
CVE-2017-10268 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101390 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10268 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268 https://linux.oracle.com/cve/CVE-2017-10268.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2017-10378 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101375 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378 https://linux.oracle.com/cve/CVE-2017-10378.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2017-10379 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101415 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10379 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379 https://linux.oracle.com/cve/CVE-2017-10379.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
mysql-server |
CVE-2017-10384 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101406 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384 https://linux.oracle.com/cve/CVE-2017-10384.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
mysql-server |
CVE-2017-3238 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95571 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238 https://linux.oracle.com/cve/CVE-2017-3238.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server |
CVE-2017-3243 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95538 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3243 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243 https://linux.oracle.com/cve/CVE-2017-3243.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server |
CVE-2017-3244 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95565 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3244 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244 https://linux.oracle.com/cve/CVE-2017-3244.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server |
CVE-2017-3258 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95560 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258 https://linux.oracle.com/cve/CVE-2017-3258.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server |
CVE-2017-3265 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95520 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3265 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265 https://linux.oracle.com/cve/CVE-2017-3265.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server |
CVE-2017-3291 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95501 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291 https://linux.oracle.com/cve/CVE-2017-3291.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server |
CVE-2017-3305 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://riddle.link/ http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/03/17/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97023 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/security/cve/CVE-2017-3305 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3308 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97725 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3308.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3309 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97742 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3309 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3309.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3312 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95491 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3312 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312 https://linux.oracle.com/cve/CVE-2017-3312.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server |
CVE-2017-3313 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3809 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95527 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3313 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313 https://linux.oracle.com/cve/CVE-2017-3313.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server |
CVE-2017-3317 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95585 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3317 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317 https://linux.oracle.com/cve/CVE-2017-3317.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server |
CVE-2017-3318 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95588 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318 https://linux.oracle.com/cve/CVE-2017-3318.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server |
CVE-2017-3329 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97763 http://www.securitytracker.com/id/1038287 https://access.redhat.com/security/cve/CVE-2017-3329 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3453 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97776 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3453 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453 https://linux.oracle.com/cve/CVE-2017-3453.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3456 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97831 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3456 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456 https://linux.oracle.com/cve/CVE-2017-3456.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3461 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97812 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3462 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97851 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3463 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97849 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3463 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3464 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97818 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3464 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464 https://linux.oracle.com/cve/CVE-2017-3464.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3600 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97765 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3600 https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/ https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600 https://linux.oracle.com/cve/CVE-2017-3600.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3635 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99730 http://www.securitytracker.com/id/1038928 https://access.redhat.com/security/cve/CVE-2017-3635 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3636 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99736 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3636 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636 https://linux.oracle.com/cve/CVE-2017-3636.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-server |
CVE-2017-3641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99767 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641 https://linux.oracle.com/cve/CVE-2017-3641.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-server |
CVE-2017-3648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99789 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3651 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99802 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651 https://linux.oracle.com/cve/CVE-2017-3651.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3652 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99805 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3652 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server |
CVE-2017-3653 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99810 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3653 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653 https://linux.oracle.com/cve/CVE-2017-3653.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-server |
CVE-2018-2562 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102713 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562 https://linux.oracle.com/cve/CVE-2018-2562.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-2622 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102706 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622 https://linux.oracle.com/cve/CVE-2018-2622.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-2640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102678 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640 https://linux.oracle.com/cve/CVE-2018-2640.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-2665 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102681 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2665 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665 https://linux.oracle.com/cve/CVE-2018-2665.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-2668 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102682 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2668 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668 https://linux.oracle.com/cve/CVE-2018-2668.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-2755 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103807 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755 https://linux.oracle.com/cve/CVE-2018-2755.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-2761 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103820 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2761 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761 https://linux.oracle.com/cve/CVE-2018-2761.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-2767 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/103954 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2018-2767 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767 https://linux.oracle.com/cve/CVE-2018-2767.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-2771 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103828 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2771 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771 https://linux.oracle.com/cve/CVE-2018-2771.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-2773 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103811 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
mysql-server |
CVE-2018-2781 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103825 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781 https://linux.oracle.com/cve/CVE-2018-2781.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-2813 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103830 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813 https://linux.oracle.com/cve/CVE-2018-2813.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-2817 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103818 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2817 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817 https://linux.oracle.com/cve/CVE-2018-2817.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-2818 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103824 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2818 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
mysql-server |
CVE-2018-2819 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103814 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819 https://linux.oracle.com/cve/CVE-2018-2819.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-3058 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3058 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058 https://linux.oracle.com/cve/CVE-2018-3058.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-3063 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104786 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3063 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063 https://linux.oracle.com/cve/CVE-2018-3063.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-3066 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3066 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066 https://linux.oracle.com/cve/CVE-2018-3066.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-3070 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-3070 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/
|
mysql-server |
CVE-2018-3081 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104779 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081 https://linux.oracle.com/cve/CVE-2018-3081.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server |
CVE-2018-3133 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3133 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-server |
CVE-2018-3174 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105612 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3174 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-server |
CVE-2018-3282 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3282 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282 https://linux.oracle.com/cve/CVE-2018-3282.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-server |
CVE-2017-3302 |
LOW |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3809 http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/01/28/1 http://www.openwall.com/lists/oss-security/2017/02/11/11 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/96162 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3302 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302 https://linux.oracle.com/cve/CVE-2017-3302.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2016-0640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86427 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640 https://linux.oracle.com/cve/CVE-2016-0640.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server-5.5 |
CVE-2016-0641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86470 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641 https://linux.oracle.com/cve/CVE-2016-0641.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server-5.5 |
CVE-2016-0642 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3557 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86445 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0642 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642 https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server-5.5 |
CVE-2016-0643 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86486 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0643 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643 https://linux.oracle.com/cve/CVE-2016-0643.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server-5.5 |
CVE-2016-0644 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86442 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0644 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644 https://linux.oracle.com/cve/CVE-2016-0644.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server-5.5 |
CVE-2016-0646 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86436 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0646 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646 https://linux.oracle.com/cve/CVE-2016-0646.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server-5.5 |
CVE-2016-0647 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86495 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647 https://linux.oracle.com/cve/CVE-2016-0647.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server-5.5 |
CVE-2016-0648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86457 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648 https://linux.oracle.com/cve/CVE-2016-0648.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server-5.5 |
CVE-2016-0649 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86498 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0649 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649 https://linux.oracle.com/cve/CVE-2016-0649.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server-5.5 |
CVE-2016-0650 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86496 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0650 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650 https://linux.oracle.com/cve/CVE-2016-0650.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server-5.5 |
CVE-2016-0666 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86509 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666 https://linux.oracle.com/cve/CVE-2016-0666.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server-5.5 |
CVE-2016-2047 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://marc.info/?l=oss-security&m=145379584107459&w=2 http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3453 http://www.debian.org/security/2016/dsa-3557 http://www.openwall.com/lists/oss-security/2016/01/26/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/81810 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-2047 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047 https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41 https://linux.oracle.com/cve/CVE-2016-2047.html https://linux.oracle.com/errata/ELSA-2016-0534.html https://mariadb.atlassian.net/browse/MDEV-9212 https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/ https://mariadb.com/kb/en/mdb-10023-rn/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server-5.5 |
CVE-2016-3477 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91902 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477 https://linux.oracle.com/cve/CVE-2016-3477.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-server-5.5 |
CVE-2016-3492 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93650 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-3492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492 https://linux.oracle.com/cve/CVE-2016-3492.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-server-5.5 |
CVE-2016-3521 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91932 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3521 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521 https://linux.oracle.com/cve/CVE-2016-3521.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-server-5.5 |
CVE-2016-3615 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91960 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615 https://linux.oracle.com/cve/CVE-2016-3615.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-server-5.5 |
CVE-2016-5440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91953 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-5440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440 https://linux.oracle.com/cve/CVE-2016-5440.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-server-5.5 |
CVE-2016-5584 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93735 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5584 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3109-1
|
mysql-server-5.5 |
CVE-2016-5612 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93630 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5612 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612 https://linux.oracle.com/cve/CVE-2016-5612.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://security.gentoo.org/glsa/201701-01
|
mysql-server-5.5 |
CVE-2016-5624 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93635 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624 https://linux.oracle.com/cve/CVE-2016-5624.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
|
mysql-server-5.5 |
CVE-2016-5626 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93638 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5626 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626 https://linux.oracle.com/cve/CVE-2016-5626.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-server-5.5 |
CVE-2016-5629 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93668 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629 https://linux.oracle.com/cve/CVE-2016-5629.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-server-5.5 |
CVE-2016-6662 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html http://rhn.redhat.com/errata/RHSA-2016-2058.html http://rhn.redhat.com/errata/RHSA-2016-2059.html http://rhn.redhat.com/errata/RHSA-2016-2060.html http://rhn.redhat.com/errata/RHSA-2016-2061.html http://rhn.redhat.com/errata/RHSA-2016-2062.html http://rhn.redhat.com/errata/RHSA-2016-2077.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Sep/23 http://www.debian.org/security/2016/dsa-3666 http://www.openwall.com/lists/oss-security/2016/09/12/3 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92912 http://www.securitytracker.com/id/1036769 https://access.redhat.com/security/cve/CVE-2016-6662 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662 https://jira.mariadb.org/browse/MDEV-10465 https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt https://linux.oracle.com/cve/CVE-2016-6662.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3078-1 https://www.exploit-db.com/exploits/40360/ https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
|
mysql-server-5.5 |
CVE-2016-6663 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.openwall.com/lists/oss-security/2016/10/25/4 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92911 http://www.securityfocus.com/bid/93614 https://access.redhat.com/security/cve/CVE-2016-6663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663 https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805 https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291 https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6663.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://www.exploit-db.com/exploits/40678/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
mysql-server-5.5 |
CVE-2016-6664 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.securityfocus.com/archive/1/539695/100/0/threaded http://www.securityfocus.com/bid/93612 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2016-6664 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664 https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6664.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://nvd.nist.gov/vuln/detail/CVE-2016-6664 https://security.gentoo.org/glsa/201702-18 https://www.exploit-db.com/exploits/40679/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
mysql-server-5.5 |
CVE-2016-7440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93659 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-7440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://ubuntu.com/security/notices/USN-3109-1 https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
|
mysql-server-5.5 |
CVE-2016-8283 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93737 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-8283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283 https://linux.oracle.com/cve/CVE-2016-8283.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-server-5.5 |
CVE-2017-10268 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101390 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10268 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268 https://linux.oracle.com/cve/CVE-2017-10268.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2017-10378 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101375 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378 https://linux.oracle.com/cve/CVE-2017-10378.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2017-10379 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101415 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10379 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379 https://linux.oracle.com/cve/CVE-2017-10379.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
mysql-server-5.5 |
CVE-2017-10384 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101406 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384 https://linux.oracle.com/cve/CVE-2017-10384.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
mysql-server-5.5 |
CVE-2017-3238 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95571 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238 https://linux.oracle.com/cve/CVE-2017-3238.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-5.5 |
CVE-2017-3243 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95538 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3243 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243 https://linux.oracle.com/cve/CVE-2017-3243.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-5.5 |
CVE-2017-3244 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95565 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3244 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244 https://linux.oracle.com/cve/CVE-2017-3244.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-5.5 |
CVE-2017-3258 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95560 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258 https://linux.oracle.com/cve/CVE-2017-3258.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-5.5 |
CVE-2017-3265 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95520 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3265 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265 https://linux.oracle.com/cve/CVE-2017-3265.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-5.5 |
CVE-2017-3291 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95501 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291 https://linux.oracle.com/cve/CVE-2017-3291.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-5.5 |
CVE-2017-3305 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://riddle.link/ http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/03/17/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97023 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/security/cve/CVE-2017-3305 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3308 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97725 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3308.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3309 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97742 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3309 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3309.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3312 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95491 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3312 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312 https://linux.oracle.com/cve/CVE-2017-3312.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-5.5 |
CVE-2017-3313 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3809 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95527 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3313 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313 https://linux.oracle.com/cve/CVE-2017-3313.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-5.5 |
CVE-2017-3317 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95585 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3317 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317 https://linux.oracle.com/cve/CVE-2017-3317.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-5.5 |
CVE-2017-3318 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95588 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318 https://linux.oracle.com/cve/CVE-2017-3318.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-5.5 |
CVE-2017-3329 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97763 http://www.securitytracker.com/id/1038287 https://access.redhat.com/security/cve/CVE-2017-3329 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3453 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97776 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3453 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453 https://linux.oracle.com/cve/CVE-2017-3453.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3456 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97831 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3456 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456 https://linux.oracle.com/cve/CVE-2017-3456.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3461 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97812 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3462 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97851 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3463 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97849 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3463 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3464 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97818 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3464 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464 https://linux.oracle.com/cve/CVE-2017-3464.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3600 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97765 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3600 https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/ https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600 https://linux.oracle.com/cve/CVE-2017-3600.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3635 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99730 http://www.securitytracker.com/id/1038928 https://access.redhat.com/security/cve/CVE-2017-3635 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3636 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99736 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3636 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636 https://linux.oracle.com/cve/CVE-2017-3636.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-server-5.5 |
CVE-2017-3641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99767 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641 https://linux.oracle.com/cve/CVE-2017-3641.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-server-5.5 |
CVE-2017-3648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99789 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3651 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99802 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651 https://linux.oracle.com/cve/CVE-2017-3651.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3652 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99805 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3652 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-5.5 |
CVE-2017-3653 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99810 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3653 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653 https://linux.oracle.com/cve/CVE-2017-3653.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-server-5.5 |
CVE-2018-2562 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102713 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562 https://linux.oracle.com/cve/CVE-2018-2562.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-2622 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102706 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622 https://linux.oracle.com/cve/CVE-2018-2622.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-2640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102678 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640 https://linux.oracle.com/cve/CVE-2018-2640.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-2665 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102681 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2665 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665 https://linux.oracle.com/cve/CVE-2018-2665.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-2668 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102682 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2668 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668 https://linux.oracle.com/cve/CVE-2018-2668.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-2755 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103807 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755 https://linux.oracle.com/cve/CVE-2018-2755.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-2761 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103820 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2761 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761 https://linux.oracle.com/cve/CVE-2018-2761.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-2767 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/103954 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2018-2767 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767 https://linux.oracle.com/cve/CVE-2018-2767.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-2771 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103828 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2771 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771 https://linux.oracle.com/cve/CVE-2018-2771.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-2773 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103811 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
mysql-server-5.5 |
CVE-2018-2781 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103825 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781 https://linux.oracle.com/cve/CVE-2018-2781.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-2813 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103830 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813 https://linux.oracle.com/cve/CVE-2018-2813.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-2817 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103818 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2817 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817 https://linux.oracle.com/cve/CVE-2018-2817.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-2818 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103824 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2818 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
mysql-server-5.5 |
CVE-2018-2819 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103814 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819 https://linux.oracle.com/cve/CVE-2018-2819.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-3058 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3058 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058 https://linux.oracle.com/cve/CVE-2018-3058.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-3063 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104786 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3063 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063 https://linux.oracle.com/cve/CVE-2018-3063.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-3066 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3066 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066 https://linux.oracle.com/cve/CVE-2018-3066.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-3070 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-3070 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/
|
mysql-server-5.5 |
CVE-2018-3081 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104779 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081 https://linux.oracle.com/cve/CVE-2018-3081.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server-5.5 |
CVE-2018-3133 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3133 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-server-5.5 |
CVE-2018-3174 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105612 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3174 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-server-5.5 |
CVE-2018-3282 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3282 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282 https://linux.oracle.com/cve/CVE-2018-3282.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-server-5.5 |
CVE-2017-3302 |
LOW |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3809 http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/01/28/1 http://www.openwall.com/lists/oss-security/2017/02/11/11 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/96162 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3302 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302 https://linux.oracle.com/cve/CVE-2017-3302.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2016-0640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86427 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640 https://linux.oracle.com/cve/CVE-2016-0640.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server-core-5.5 |
CVE-2016-0641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86470 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641 https://linux.oracle.com/cve/CVE-2016-0641.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server-core-5.5 |
CVE-2016-0642 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3557 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86445 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0642 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642 https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server-core-5.5 |
CVE-2016-0643 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.securityfocus.com/bid/86486 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0643 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643 https://linux.oracle.com/cve/CVE-2016-0643.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server-core-5.5 |
CVE-2016-0644 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86442 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0644 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644 https://linux.oracle.com/cve/CVE-2016-0644.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server-core-5.5 |
CVE-2016-0646 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86436 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0646 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646 https://linux.oracle.com/cve/CVE-2016-0646.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server-core-5.5 |
CVE-2016-0647 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86495 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647 https://linux.oracle.com/cve/CVE-2016-0647.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server-core-5.5 |
CVE-2016-0648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86457 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648 https://linux.oracle.com/cve/CVE-2016-0648.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server-core-5.5 |
CVE-2016-0649 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86498 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0649 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649 https://linux.oracle.com/cve/CVE-2016-0649.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server-core-5.5 |
CVE-2016-0650 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86496 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0650 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650 https://linux.oracle.com/cve/CVE-2016-0650.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://ubuntu.com/security/notices/USN-2953-1
|
mysql-server-core-5.5 |
CVE-2016-0666 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3557 http://www.debian.org/security/2016/dsa-3595 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/86509 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-0666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666 https://linux.oracle.com/cve/CVE-2016-0666.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server-core-5.5 |
CVE-2016-2047 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.49-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html http://marc.info/?l=oss-security&m=145379584107459&w=2 http://rhn.redhat.com/errata/RHSA-2016-0534.html http://rhn.redhat.com/errata/RHSA-2016-0705.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1481.html http://www.debian.org/security/2016/dsa-3453 http://www.debian.org/security/2016/dsa-3557 http://www.openwall.com/lists/oss-security/2016/01/26/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/81810 http://www.securitytracker.com/id/1035606 http://www.ubuntu.com/usn/USN-2953-1 http://www.ubuntu.com/usn/USN-2954-1 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-2047 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047 https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41 https://linux.oracle.com/cve/CVE-2016-2047.html https://linux.oracle.com/errata/ELSA-2016-0534.html https://mariadb.atlassian.net/browse/MDEV-9212 https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/ https://mariadb.com/kb/en/mdb-10023-rn/ https://ubuntu.com/security/notices/USN-2953-1 https://ubuntu.com/security/notices/USN-2954-1
|
mysql-server-core-5.5 |
CVE-2016-3477 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91902 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477 https://linux.oracle.com/cve/CVE-2016-3477.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-server-core-5.5 |
CVE-2016-3492 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93650 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-3492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492 https://linux.oracle.com/cve/CVE-2016-3492.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-server-core-5.5 |
CVE-2016-3521 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91932 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3521 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521 https://linux.oracle.com/cve/CVE-2016-3521.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-server-core-5.5 |
CVE-2016-3615 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91960 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-3615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615 https://linux.oracle.com/cve/CVE-2016-3615.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-server-core-5.5 |
CVE-2016-5440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.50-0ubuntu0.14.04.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-1480.html http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-1602.html http://rhn.redhat.com/errata/RHSA-2016-1603.html http://rhn.redhat.com/errata/RHSA-2016-1604.html http://rhn.redhat.com/errata/RHSA-2016-1637.html http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168 http://www.debian.org/security/2016/dsa-3624 http://www.debian.org/security/2016/dsa-3632 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91787 http://www.securityfocus.com/bid/91953 http://www.securitytracker.com/id/1036362 http://www.ubuntu.com/usn/USN-3040-1 https://access.redhat.com/security/cve/CVE-2016-5440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440 https://linux.oracle.com/cve/CVE-2016-5440.html https://linux.oracle.com/errata/ELSA-2016-1602.html https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/ https://ubuntu.com/security/notices/USN-3040-1
|
mysql-server-core-5.5 |
CVE-2016-5584 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93735 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5584 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3109-1
|
mysql-server-core-5.5 |
CVE-2016-5612 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93630 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5612 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612 https://linux.oracle.com/cve/CVE-2016-5612.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://security.gentoo.org/glsa/201701-01
|
mysql-server-core-5.5 |
CVE-2016-5624 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93635 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624 https://linux.oracle.com/cve/CVE-2016-5624.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
|
mysql-server-core-5.5 |
CVE-2016-5626 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93638 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5626 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626 https://linux.oracle.com/cve/CVE-2016-5626.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-server-core-5.5 |
CVE-2016-5629 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93668 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-5629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629 https://linux.oracle.com/cve/CVE-2016-5629.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-server-core-5.5 |
CVE-2016-6662 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html http://rhn.redhat.com/errata/RHSA-2016-2058.html http://rhn.redhat.com/errata/RHSA-2016-2059.html http://rhn.redhat.com/errata/RHSA-2016-2060.html http://rhn.redhat.com/errata/RHSA-2016-2061.html http://rhn.redhat.com/errata/RHSA-2016-2062.html http://rhn.redhat.com/errata/RHSA-2016-2077.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Sep/23 http://www.debian.org/security/2016/dsa-3666 http://www.openwall.com/lists/oss-security/2016/09/12/3 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92912 http://www.securitytracker.com/id/1036769 https://access.redhat.com/security/cve/CVE-2016-6662 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662 https://jira.mariadb.org/browse/MDEV-10465 https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt https://linux.oracle.com/cve/CVE-2016-6662.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/ https://security.gentoo.org/glsa/201701-01 https://ubuntu.com/security/notices/USN-3078-1 https://www.exploit-db.com/exploits/40360/ https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
|
mysql-server-core-5.5 |
CVE-2016-6663 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://rhn.redhat.com/errata/RHSA-2017-0184.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.openwall.com/lists/oss-security/2016/10/25/4 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.securityfocus.com/bid/92911 http://www.securityfocus.com/bid/93614 https://access.redhat.com/security/cve/CVE-2016-6663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663 https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805 https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291 https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6663.html https://linux.oracle.com/errata/ELSA-2017-0184.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://www.exploit-db.com/exploits/40678/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
mysql-server-core-5.5 |
CVE-2016-6664 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://seclists.org/fulldisclosure/2016/Nov/4 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.securityfocus.com/archive/1/539695/100/0/threaded http://www.securityfocus.com/bid/93612 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2016-6664 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664 https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt https://linux.oracle.com/cve/CVE-2016-6664.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://nvd.nist.gov/vuln/detail/CVE-2016-6664 https://security.gentoo.org/glsa/201702-18 https://www.exploit-db.com/exploits/40679/ https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
|
mysql-server-core-5.5 |
CVE-2016-7440 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.53-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2016/dsa-3706 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93659 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-7440 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440 https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://ubuntu.com/security/notices/USN-3109-1 https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
|
mysql-server-core-5.5 |
CVE-2016-8283 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.52-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html http://rhn.redhat.com/errata/RHSA-2016-2131.html http://rhn.redhat.com/errata/RHSA-2016-2595.html http://rhn.redhat.com/errata/RHSA-2016-2749.html http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL http://www.securityfocus.com/bid/93737 http://www.securitytracker.com/id/1037050 https://access.redhat.com/security/cve/CVE-2016-8283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283 https://linux.oracle.com/cve/CVE-2016-8283.html https://linux.oracle.com/errata/ELSA-2016-2595.html https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://security.gentoo.org/glsa/201701-01
|
mysql-server-core-5.5 |
CVE-2017-10268 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101390 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10268 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268 https://linux.oracle.com/cve/CVE-2017-10268.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2017-10378 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101375 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2017-10378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378 https://linux.oracle.com/cve/CVE-2017-10378.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2017-10379 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101415 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10379 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379 https://linux.oracle.com/cve/CVE-2017-10379.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
mysql-server-core-5.5 |
CVE-2017-10384 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.58-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-4002 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL http://www.securityfocus.com/bid/101406 http://www.securitytracker.com/id/1039597 https://access.redhat.com/errata/RHSA-2017:3265 https://access.redhat.com/errata/RHSA-2017:3442 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-10384 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384 https://linux.oracle.com/cve/CVE-2017-10384.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://security.netapp.com/advisory/ntap-20171019-0002/ https://ubuntu.com/security/notices/USN-3459-1 https://ubuntu.com/security/notices/USN-3459-2
|
mysql-server-core-5.5 |
CVE-2017-3238 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95571 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238 https://linux.oracle.com/cve/CVE-2017-3238.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-core-5.5 |
CVE-2017-3243 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95538 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3243 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243 https://linux.oracle.com/cve/CVE-2017-3243.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-core-5.5 |
CVE-2017-3244 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95565 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3244 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244 https://linux.oracle.com/cve/CVE-2017-3244.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-core-5.5 |
CVE-2017-3258 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95560 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258 https://linux.oracle.com/cve/CVE-2017-3258.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-core-5.5 |
CVE-2017-3265 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95520 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3265 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265 https://linux.oracle.com/cve/CVE-2017-3265.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-core-5.5 |
CVE-2017-3291 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95501 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291 https://linux.oracle.com/cve/CVE-2017-3291.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-core-5.5 |
CVE-2017-3305 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://riddle.link/ http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/03/17/3 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97023 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/security/cve/CVE-2017-3305 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3308 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97725 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3308.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3309 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97742 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3309 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://linux.oracle.com/cve/CVE-2017-3309.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3312 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95491 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3312 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312 https://linux.oracle.com/cve/CVE-2017-3312.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-core-5.5 |
CVE-2017-3313 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3809 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95527 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3313 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313 https://linux.oracle.com/cve/CVE-2017-3313.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-core-5.5 |
CVE-2017-3317 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95585 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3317 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317 https://linux.oracle.com/cve/CVE-2017-3317.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-core-5.5 |
CVE-2017-3318 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.54-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3767 http://www.debian.org/security/2017/dsa-3770 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.securityfocus.com/bid/95588 http://www.securitytracker.com/id/1037640 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318 https://linux.oracle.com/cve/CVE-2017-3318.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://security.gentoo.org/glsa/201702-17 https://security.gentoo.org/glsa/201702-18 https://ubuntu.com/security/notices/USN-3174-1
|
mysql-server-core-5.5 |
CVE-2017-3329 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97763 http://www.securitytracker.com/id/1038287 https://access.redhat.com/security/cve/CVE-2017-3329 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3453 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97776 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3453 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453 https://linux.oracle.com/cve/CVE-2017-3453.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3456 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97831 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3456 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456 https://linux.oracle.com/cve/CVE-2017-3456.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3461 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97812 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3462 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97851 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3463 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97849 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3463 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463 https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3464 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3834 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.securityfocus.com/bid/97818 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3464 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464 https://linux.oracle.com/cve/CVE-2017-3464.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3600 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3834 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97765 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3600 https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/ https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600 https://linux.oracle.com/cve/CVE-2017-3600.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3635 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99730 http://www.securitytracker.com/id/1038928 https://access.redhat.com/security/cve/CVE-2017-3635 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3636 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99736 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3636 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636 https://linux.oracle.com/cve/CVE-2017-3636.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-server-core-5.5 |
CVE-2017-3641 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99767 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3641 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641 https://linux.oracle.com/cve/CVE-2017-3641.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-server-core-5.5 |
CVE-2017-3648 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99789 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3651 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html http://rhn.redhat.com/errata/RHSA-2016-2928.html http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99802 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651 https://linux.oracle.com/cve/CVE-2017-3651.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3652 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99805 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/security/cve/CVE-2017-3652 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652 https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2
|
mysql-server-core-5.5 |
CVE-2017-3653 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.57-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3922 http://www.debian.org/security/2017/dsa-3944 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL http://www.securityfocus.com/bid/99810 http://www.securitytracker.com/id/1038928 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2017:2886 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2017-3653 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653 https://linux.oracle.com/cve/CVE-2017-3653.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://ubuntu.com/security/notices/USN-3357-1 https://ubuntu.com/security/notices/USN-3357-2 https://www.debian.org/security/2017/dsa-3955
|
mysql-server-core-5.5 |
CVE-2018-2562 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102713 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562 https://linux.oracle.com/cve/CVE-2018-2562.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-2622 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102706 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622 https://linux.oracle.com/cve/CVE-2018-2622.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-2640 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102678 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640 https://linux.oracle.com/cve/CVE-2018-2640.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-2665 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102681 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2665 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665 https://linux.oracle.com/cve/CVE-2018-2665.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-2668 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.59-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL http://www.securityfocus.com/bid/102682 http://www.securitytracker.com/id/1040216 https://access.redhat.com/errata/RHSA-2018:0586 https://access.redhat.com/errata/RHSA-2018:0587 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2668 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668 https://linux.oracle.com/cve/CVE-2018-2668.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.netapp.com/advisory/ntap-20180117-0002/ https://ubuntu.com/security/notices/USN-3537-1 https://ubuntu.com/security/notices/USN-3537-2 https://usn.ubuntu.com/3537-1/ https://usn.ubuntu.com/3537-2/ https://www.debian.org/security/2018/dsa-4091 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-2755 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103807 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755 https://linux.oracle.com/cve/CVE-2018-2755.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-2761 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103820 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2761 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761 https://linux.oracle.com/cve/CVE-2018-2761.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-2767 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/103954 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/security/cve/CVE-2018-2767 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767 https://linux.oracle.com/cve/CVE-2018-2767.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-2771 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103828 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2771 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771 https://linux.oracle.com/cve/CVE-2018-2771.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-2773 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103811 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
mysql-server-core-5.5 |
CVE-2018-2781 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103825 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781 https://linux.oracle.com/cve/CVE-2018-2781.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-2813 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103830 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813 https://linux.oracle.com/cve/CVE-2018-2813.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-2817 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103818 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2817 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817 https://linux.oracle.com/cve/CVE-2018-2817.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-2818 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103824 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-2818 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176
|
mysql-server-core-5.5 |
CVE-2018-2819 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.60-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103814 http://www.securitytracker.com/id/1040698 https://access.redhat.com/errata/RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-2819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819 https://linux.oracle.com/cve/CVE-2018-2819.html https://linux.oracle.com/errata/ELSA-2018-2439.html https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20180419-0002/ https://ubuntu.com/security/notices/USN-3629-1 https://ubuntu.com/security/notices/USN-3629-2 https://ubuntu.com/security/notices/USN-3629-3 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ https://www.debian.org/security/2018/dsa-4176 https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-3058 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3058 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058 https://linux.oracle.com/cve/CVE-2018-3058.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-3063 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104786 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3063 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063 https://linux.oracle.com/cve/CVE-2018-3063.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-3066 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3066 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066 https://linux.oracle.com/cve/CVE-2018-3066.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-3070 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104766 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/security/cve/CVE-2018-3070 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/ https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/
|
mysql-server-core-5.5 |
CVE-2018-3081 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.61-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104779 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081 https://linux.oracle.com/cve/CVE-2018-3081.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002/ https://ubuntu.com/security/notices/USN-3725-1 https://ubuntu.com/security/notices/USN-3725-2 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ https://www.debian.org/security/2018/dsa-4341
|
mysql-server-core-5.5 |
CVE-2018-3133 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3133 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-server-core-5.5 |
CVE-2018-3174 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105612 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/security/cve/CVE-2018-3174 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-server-core-5.5 |
CVE-2018-3282 |
MEDIUM |
5.5.47-0ubuntu0.14.04.1 |
5.5.62-0ubuntu0.14.04.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105610 http://www.securitytracker.com/id/1041888 https://access.redhat.com/errata/RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://access.redhat.com/security/cve/CVE-2018-3282 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282 https://linux.oracle.com/cve/CVE-2018-3282.html https://linux.oracle.com/errata/ELSA-2019-2327.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html https://security.gentoo.org/glsa/201908-24 https://security.netapp.com/advisory/ntap-20181018-0002/ https://ubuntu.com/security/notices/USN-3799-1 https://ubuntu.com/security/notices/USN-3799-2 https://usn.ubuntu.com/3799-1/ https://usn.ubuntu.com/3799-2/ https://www.debian.org/security/2018/dsa-4341 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
|
mysql-server-core-5.5 |
CVE-2017-3302 |
LOW |
5.5.47-0ubuntu0.14.04.1 |
5.5.55-0ubuntu0.14.04.1 |
Expand...http://www.debian.org/security/2017/dsa-3809 http://www.debian.org/security/2017/dsa-3834 http://www.openwall.com/lists/oss-security/2017/01/28/1 http://www.openwall.com/lists/oss-security/2017/02/11/11 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/96162 http://www.securitytracker.com/id/1038287 https://access.redhat.com/errata/RHSA-2017:2192 https://access.redhat.com/errata/RHSA-2017:2787 https://access.redhat.com/errata/RHSA-2018:0279 https://access.redhat.com/errata/RHSA-2018:0574 https://access.redhat.com/security/cve/CVE-2017-3302 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302 https://linux.oracle.com/cve/CVE-2017-3302.html https://linux.oracle.com/errata/ELSA-2017-2192.html https://ubuntu.com/security/notices/USN-3269-1 https://ubuntu.com/security/notices/USN-3357-2
|
ntpdate |
CVE-2015-7977 |
MEDIUM |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html http://rhn.redhat.com/errata/RHSA-2016-0780.html http://rhn.redhat.com/errata/RHSA-2016-2583.html http://support.ntp.org/bin/view/Main/NtpBug2939 http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd http://www.debian.org/security/2016/dsa-3629 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/81815 http://www.securitytracker.com/id/1034782 http://www.talosintel.com/reports/TALOS-2016-0074/ http://www.ubuntu.com/usn/USN-3096-1 https://access.redhat.com/security/cve/CVE-2015-7977 https://bto.bluecoat.com/security-advisory/sa113 https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977 https://linux.oracle.com/cve/CVE-2015-7977.html https://linux.oracle.com/errata/ELSA-2016-2583.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc https://security.gentoo.org/glsa/201607-15 https://security.netapp.com/advisory/ntap-20171031-0001/ https://ubuntu.com/security/notices/USN-3096-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 https://www.kb.cert.org/vuls/id/718152
|
ntpdate |
CVE-2015-7978 |
MEDIUM |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html http://rhn.redhat.com/errata/RHSA-2016-0780.html http://rhn.redhat.com/errata/RHSA-2016-2583.html http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd http://www.debian.org/security/2016/dsa-3629 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/81962 http://www.securitytracker.com/id/1034782 http://www.talosintel.com/reports/TALOS-2016-0075/ http://www.ubuntu.com/usn/USN-3096-1 https://access.redhat.com/security/cve/CVE-2015-7978 https://bto.bluecoat.com/security-advisory/sa113 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978 https://linux.oracle.com/cve/CVE-2015-7978.html https://linux.oracle.com/errata/ELSA-2016-2583.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc https://security.gentoo.org/glsa/201607-15 https://security.netapp.com/advisory/ntap-20171031-0001/ https://ubuntu.com/security/notices/USN-3096-1 https://www.kb.cert.org/vuls/id/718152
|
ntpdate |
CVE-2015-8138 |
MEDIUM |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html http://lists.ntp.org/pipermail/hackers/2016-January/007406.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html http://rhn.redhat.com/errata/RHSA-2016-0063.html http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd http://www.debian.org/security/2016/dsa-3629 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/81811 http://www.securitytracker.com/id/1034782 http://www.talosintel.com/reports/TALOS-2016-0077/ http://www.ubuntu.com/usn/USN-3096-1 https://access.redhat.com/security/cve/CVE-2015-8138 https://bto.bluecoat.com/security-advisory/sa113 https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us https://linux.oracle.com/cve/CVE-2015-8138.html https://linux.oracle.com/errata/ELSA-2016-0063.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc https://security.gentoo.org/glsa/201607-15 https://security.netapp.com/advisory/ntap-20171004-0002/ https://security.netapp.com/advisory/ntap-20171031-0001/ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd https://ubuntu.com/security/notices/USN-3096-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19 https://www.kb.cert.org/vuls/id/718152
|
ntpdate |
CVE-2016-1547 |
MEDIUM |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1552.html http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security http://www.debian.org/security/2016/dsa-3629 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/88276 http://www.securitytracker.com/id/1035705 http://www.talosintel.com/reports/TALOS-2016-0081/ http://www.talosintelligence.com/reports/TALOS-2016-0081/ https://access.redhat.com/errata/RHSA-2016:1141 https://access.redhat.com/security/cve/CVE-2016-1547 https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547 https://linux.oracle.com/cve/CVE-2016-1547.html https://linux.oracle.com/errata/ELSA-2016-1141.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc https://security.gentoo.org/glsa/201607-15 https://security.netapp.com/advisory/ntap-20171004-0002/ https://ubuntu.com/security/notices/USN-3096-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19
|
ntpdate |
CVE-2016-1548 |
MEDIUM |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html http://rhn.redhat.com/errata/RHSA-2016-1552.html http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd http://www.debian.org/security/2016/dsa-3629 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/archive/1/538233/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded http://www.securityfocus.com/bid/88264 http://www.securitytracker.com/id/1035705 http://www.talosintel.com/reports/TALOS-2016-0082/ http://www.talosintelligence.com/reports/TALOS-2016-0082/ http://www.ubuntu.com/usn/USN-3096-1 https://access.redhat.com/errata/RHSA-2016:1141 https://access.redhat.com/security/cve/CVE-2016-1548 https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548 https://linux.oracle.com/cve/CVE-2016-1548.html https://linux.oracle.com/errata/ELSA-2016-1141.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc https://security.gentoo.org/glsa/201607-15 https://security.netapp.com/advisory/ntap-20171004-0002/ https://ubuntu.com/security/notices/USN-3096-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11 https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19 https://www.debian.org/security/2016/dsa-3629 https://www.kb.cert.org/vuls/id/718152 https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082
|
ntpdate |
CVE-2016-1550 |
MEDIUM |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html http://rhn.redhat.com/errata/RHSA-2016-1552.html http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd http://www.debian.org/security/2016/dsa-3629 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/archive/1/538233/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded http://www.securityfocus.com/bid/88261 http://www.securitytracker.com/id/1035705 http://www.talosintel.com/reports/TALOS-2016-0084/ http://www.talosintelligence.com/reports/TALOS-2016-0084/ http://www.ubuntu.com/usn/USN-3096-1 https://access.redhat.com/errata/RHSA-2016:1141 https://access.redhat.com/security/cve/CVE-2016-1550 https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550 https://linux.oracle.com/cve/CVE-2016-1550.html https://linux.oracle.com/errata/ELSA-2016-1141.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc https://security.gentoo.org/glsa/201607-15 https://security.netapp.com/advisory/ntap-20171004-0002/ https://ubuntu.com/security/notices/USN-3096-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11 https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19 https://www.debian.org/security/2016/dsa-3629 https://www.kb.cert.org/vuls/id/718152 https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0084
|
ntpdate |
CVE-2016-2516 |
MEDIUM |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://support.ntp.org/bin/view/Main/NtpBug3011 http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security http://www.debian.org/security/2016/dsa-3629 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/88180 http://www.securitytracker.com/id/1035705 https://access.redhat.com/security/cve/CVE-2016-2516 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516 https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc https://security.gentoo.org/glsa/201607-15 https://security.netapp.com/advisory/ntap-20171004-0002/ https://ubuntu.com/security/notices/USN-3096-1 https://www.kb.cert.org/vuls/id/718152
|
ntpdate |
CVE-2018-7183 |
MEDIUM |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.13 |
Expand...http://support.ntp.org/bin/view/Main/NtpBug3414 http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S http://www.kb.cert.org/vuls/id/961909 http://www.securityfocus.com/bid/103351 https://access.redhat.com/security/cve/CVE-2018-7183 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7183 https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc https://security.gentoo.org/glsa/201805-12 https://security.netapp.com/advisory/ntap-20180626-0001/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us https://ubuntu.com/security/notices/USN-3707-1 https://ubuntu.com/security/notices/USN-3707-2 https://usn.ubuntu.com/3707-1/ https://usn.ubuntu.com/3707-2/ https://www.synology.com/support/security/Synology_SA_18_13
|
ntpdate |
CVE-2015-7973 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html http://support.ntp.org/bin/view/Main/NtpBug2935 http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd http://www.securityfocus.com/bid/81963 http://www.securitytracker.com/id/1034782 http://www.talosintel.com/reports/TALOS-2016-0070/ http://www.ubuntu.com/usn/USN-3096-1 https://access.redhat.com/security/cve/CVE-2015-7973 https://bto.bluecoat.com/security-advisory/sa113 https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc https://security.gentoo.org/glsa/201607-15 https://security.netapp.com/advisory/ntap-20171031-0001/ https://ubuntu.com/security/notices/USN-3096-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 https://www.kb.cert.org/vuls/id/718152
|
ntpdate |
CVE-2015-7974 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://bugs.ntp.org/show_bug.cgi?id=2936 http://rhn.redhat.com/errata/RHSA-2016-2583.html http://support.ntp.org/bin/view/Main/NtpBug2936 http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit http://www.debian.org/security/2016/dsa-3629 http://www.securityfocus.com/bid/81960 http://www.securitytracker.com/id/1034782 http://www.talosintel.com/reports/TALOS-2016-0071/ https://access.redhat.com/security/cve/CVE-2015-7974 https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us https://linux.oracle.com/cve/CVE-2015-7974.html https://linux.oracle.com/errata/ELSA-2016-2583.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc https://security.gentoo.org/glsa/201607-15 https://security.netapp.com/advisory/ntap-20171031-0001/ https://ubuntu.com/security/notices/USN-3096-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
|
ntpdate |
CVE-2015-7976 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html http://support.ntp.org/bin/view/Main/NtpBug2938 http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd http://www.securitytracker.com/id/1034782 http://www.talosintel.com/reports/TALOS-2016-0073/ http://www.ubuntu.com/usn/USN-3096-1 https://access.redhat.com/security/cve/CVE-2015-7976 https://bto.bluecoat.com/security-advisory/sa113 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976 https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc https://security.gentoo.org/glsa/201607-15 https://security.netapp.com/advisory/ntap-20171031-0001/ https://ubuntu.com/security/notices/USN-3096-1 https://www.kb.cert.org/vuls/id/718152
|
ntpdate |
CVE-2015-7979 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html http://rhn.redhat.com/errata/RHSA-2016-1552.html http://rhn.redhat.com/errata/RHSA-2016-2583.html http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd http://www.debian.org/security/2016/dsa-3629 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/81816 http://www.securitytracker.com/id/1034782 http://www.talosintel.com/reports/TALOS-2016-0076/ http://www.ubuntu.com/usn/USN-3096-1 https://access.redhat.com/errata/RHSA-2016:1141 https://access.redhat.com/security/cve/CVE-2015-7979 https://bto.bluecoat.com/security-advisory/sa113 https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us https://linux.oracle.com/cve/CVE-2015-7979.html https://linux.oracle.com/errata/ELSA-2016-2583.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc https://security.gentoo.org/glsa/201607-15 https://security.netapp.com/advisory/ntap-20171031-0001/ https://ubuntu.com/security/notices/USN-3096-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 https://www.kb.cert.org/vuls/id/718152
|
ntpdate |
CVE-2015-8158 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2583.html http://support.ntp.org/bin/view/Main/NtpBug2948 http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit http://www.debian.org/security/2016/dsa-3629 http://www.securityfocus.com/bid/81814 http://www.securitytracker.com/id/1034782 http://www.talosintel.com/reports/TALOS-2016-0080/ https://access.redhat.com/security/cve/CVE-2015-8158 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us https://linux.oracle.com/cve/CVE-2015-8158.html https://linux.oracle.com/errata/ELSA-2016-2583.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc https://security.gentoo.org/glsa/201607-15 https://security.netapp.com/advisory/ntap-20171031-0001/ https://ubuntu.com/security/notices/USN-3096-1 https://www.kb.cert.org/vuls/id/718152
|
ntpdate |
CVE-2016-0727 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://packetstormsecurity.com/files/141913/NTP-Privilege-Escalation.html http://www.halfdog.net/Security/2015/NtpCronjobUserNtpToRootPrivilegeEscalation/ http://www.securityfocus.com/bid/81552 http://www.securitytracker.com/id/1034808 http://www.ubuntu.com/usn/USN-3096-1 https://access.redhat.com/security/cve/CVE-2016-0727 https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1528050 https://bugzilla.redhat.com/show_bug.cgi?id=1382369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0727 https://ubuntu.com/security/notices/USN-3096-1
|
ntpdate |
CVE-2016-2518 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html http://rhn.redhat.com/errata/RHSA-2016-1552.html http://support.ntp.org/bin/view/Main/NtpBug3009 http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd http://www.debian.org/security/2016/dsa-3629 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/archive/1/538233/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded http://www.securityfocus.com/bid/88226 http://www.securitytracker.com/id/1035705 http://www.ubuntu.com/usn/USN-3096-1 https://access.redhat.com/errata/RHSA-2016:1141 https://access.redhat.com/security/cve/CVE-2016-2518 https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518 https://linux.oracle.com/cve/CVE-2016-2518.html https://linux.oracle.com/errata/ELSA-2016-1141.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc https://security.gentoo.org/glsa/201607-15 https://security.netapp.com/advisory/ntap-20171004-0002/ https://support.f5.com/csp/article/K20804323 https://ubuntu.com/security/notices/USN-3096-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11 https://www.debian.org/security/2016/dsa-3629 https://www.kb.cert.org/vuls/id/718152
|
ntpdate |
CVE-2016-4954 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://bugs.ntp.org/3044 http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html http://support.ntp.org/bin/view/Main/NtpBug3044 http://support.ntp.org/bin/view/Main/SecurityNotice http://support.ntp.org/bin/view/Main/SecurityNotice#June_2016_ntp_4_2_8p8_NTP_Securi http://www.kb.cert.org/vuls/id/321640 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securitytracker.com/id/1036037 https://access.redhat.com/security/cve/CVE-2016-4954 https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc https://security.gentoo.org/glsa/201607-15 https://ubuntu.com/security/notices/USN-3096-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
|
ntpdate |
CVE-2016-4955 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://bugs.ntp.org/3043 http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html http://support.ntp.org/bin/view/Main/NtpBug3043 http://support.ntp.org/bin/view/Main/SecurityNotice http://support.ntp.org/bin/view/Main/SecurityNotice#June_2016_ntp_4_2_8p8_NTP_Securi http://www.kb.cert.org/vuls/id/321640 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/91007 http://www.securitytracker.com/id/1036037 https://access.redhat.com/security/cve/CVE-2016-4955 https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955 https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc https://security.gentoo.org/glsa/201607-15 https://ubuntu.com/security/notices/USN-3096-1
|
ntpdate |
CVE-2016-4956 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
Expand...http://bugs.ntp.org/3042 http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html http://support.ntp.org/bin/view/Main/NtpBug3042 http://support.ntp.org/bin/view/Main/SecurityNotice http://support.ntp.org/bin/view/Main/SecurityNotice#June_2016_ntp_4_2_8p8_NTP_Securi http://www.kb.cert.org/vuls/id/321640 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/91009 http://www.securitytracker.com/id/1036037 https://access.redhat.com/security/cve/CVE-2016-4956 https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc https://security.gentoo.org/glsa/201607-15 https://ubuntu.com/security/notices/USN-3096-1
|
ntpdate |
CVE-2016-7426 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
Expand...http://nwtime.org/ntp428p9_release/ http://rhn.redhat.com/errata/RHSA-2017-0252.html http://support.ntp.org/bin/view/Main/NtpBug3071 http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities http://www.securityfocus.com/bid/94451 http://www.securitytracker.com/id/1037354 https://access.redhat.com/security/cve/CVE-2016-7426 https://bto.bluecoat.com/security-advisory/sa139 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us https://linux.oracle.com/cve/CVE-2016-7426.html https://linux.oracle.com/errata/ELSA-2017-0252.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc https://ubuntu.com/security/notices/USN-3349-1 https://ubuntu.com/security/notices/USN-3707-2 https://usn.ubuntu.com/3707-2/ https://www.kb.cert.org/vuls/id/633847
|
ntpdate |
CVE-2016-7427 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
Expand...http://nwtime.org/ntp428p9_release/ http://support.ntp.org/bin/view/Main/NtpBug3114 http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities http://www.securityfocus.com/bid/94447 http://www.securitytracker.com/id/1037354 https://access.redhat.com/security/cve/CVE-2016-7427 https://bto.bluecoat.com/security-advisory/sa139 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03883en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03899en_us https://ubuntu.com/security/notices/USN-3349-1 https://ubuntu.com/security/notices/USN-3707-2 https://usn.ubuntu.com/3707-2/ https://www.kb.cert.org/vuls/id/633847 https://www.talosintelligence.com/reports/TALOS-2016-0131/
|
ntpdate |
CVE-2016-7428 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
Expand...http://nwtime.org/ntp428p9_release/ http://support.ntp.org/bin/view/Main/NtpBug3113 http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities http://www.securityfocus.com/bid/94446 http://www.securitytracker.com/id/1037354 http://www.talosintelligence.com/reports/TALOS-2016-0130/ https://access.redhat.com/security/cve/CVE-2016-7428 https://bto.bluecoat.com/security-advisory/sa139 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03883en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03899en_us https://ubuntu.com/security/notices/USN-3349-1 https://ubuntu.com/security/notices/USN-3707-2 https://usn.ubuntu.com/3707-2/ https://www.kb.cert.org/vuls/id/633847
|
ntpdate |
CVE-2016-7429 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
Expand...http://nwtime.org/ntp428p9_release/ http://rhn.redhat.com/errata/RHSA-2017-0252.html http://support.ntp.org/bin/view/Main/NtpBug3072 http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/94453 http://www.securitytracker.com/id/1037354 https://access.redhat.com/security/cve/CVE-2016-7429 https://bto.bluecoat.com/security-advisory/sa139 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us https://linux.oracle.com/cve/CVE-2016-7429.html https://linux.oracle.com/errata/ELSA-2017-0252.html https://ubuntu.com/security/notices/USN-3349-1 https://www.kb.cert.org/vuls/id/633847
|
ntpdate |
CVE-2016-9310 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
Expand...http://nwtime.org/ntp428p9_release/ http://rhn.redhat.com/errata/RHSA-2017-0252.html http://support.ntp.org/bin/view/Main/NtpBug3118 http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities http://www.securityfocus.com/bid/94452 http://www.securitytracker.com/id/1037354 http://www.talosintelligence.com/reports/TALOS-2016-0203/ https://access.redhat.com/security/cve/CVE-2016-9310 https://bto.bluecoat.com/security-advisory/sa139 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us https://linux.oracle.com/cve/CVE-2016-9310.html https://linux.oracle.com/errata/ELSA-2017-0252.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03799en_us https://ubuntu.com/security/notices/USN-3349-1 https://ubuntu.com/security/notices/USN-3707-2 https://usn.ubuntu.com/3707-2/ https://www.kb.cert.org/vuls/id/633847
|
ntpdate |
CVE-2016-9311 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
Expand...http://nwtime.org/ntp428p9_release/ http://rhn.redhat.com/errata/RHSA-2017-0252.html http://support.ntp.org/bin/view/Main/NtpBug3119 http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities http://www.securityfocus.com/bid/94444 http://www.securitytracker.com/id/1037354 http://www.talosintelligence.com/reports/TALOS-2016-0204/ https://access.redhat.com/security/cve/CVE-2016-9311 https://bto.bluecoat.com/security-advisory/sa139 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us https://linux.oracle.com/cve/CVE-2016-9311.html https://linux.oracle.com/errata/ELSA-2017-0252.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03799en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03885en_us https://ubuntu.com/security/notices/USN-3349-1 https://ubuntu.com/security/notices/USN-3707-2 https://usn.ubuntu.com/3707-2/ https://www.kb.cert.org/vuls/id/633847
|
ntpdate |
CVE-2017-6458 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
Expand...http://support.ntp.org/bin/view/Main/NtpBug3379 http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu http://www.securityfocus.com/bid/97051 http://www.securitytracker.com/id/1038123 https://access.redhat.com/security/cve/CVE-2017-6458 https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6458 https://support.apple.com/HT208144 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us https://ubuntu.com/security/notices/USN-3349-1
|
ntpdate |
CVE-2017-6462 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
Expand...http://support.ntp.org/bin/view/Main/NtpBug3388 http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu http://www.securityfocus.com/bid/97045 http://www.securitytracker.com/id/1038123 https://access.redhat.com/errata/RHSA-2017:3071 https://access.redhat.com/errata/RHSA-2018:0855 https://access.redhat.com/security/cve/CVE-2017-6462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462 https://linux.oracle.com/cve/CVE-2017-6462.html https://linux.oracle.com/errata/ELSA-2018-0855.html https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc https://support.apple.com/HT208144 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us https://ubuntu.com/security/notices/USN-3349-1 https://ubuntu.com/security/notices/USN-3707-2 https://usn.ubuntu.com/3707-2/
|
ntpdate |
CVE-2017-6463 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
Expand...http://support.ntp.org/bin/view/Main/NtpBug3387 http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu http://www.securityfocus.com/bid/97049 http://www.securitytracker.com/id/1038123 https://access.redhat.com/errata/RHSA-2017:3071 https://access.redhat.com/errata/RHSA-2018:0855 https://access.redhat.com/security/cve/CVE-2017-6463 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463 https://linux.oracle.com/cve/CVE-2017-6463.html https://linux.oracle.com/errata/ELSA-2018-0855.html https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc https://support.apple.com/HT208144 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us https://ubuntu.com/security/notices/USN-3349-1 https://ubuntu.com/security/notices/USN-3707-2 https://usn.ubuntu.com/3707-2/
|
ntpdate |
CVE-2017-6464 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
Expand...http://support.ntp.org/bin/view/Main/NtpBug3389 http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu http://www.securityfocus.com/bid/97050 http://www.securitytracker.com/id/1038123 https://access.redhat.com/errata/RHSA-2017:3071 https://access.redhat.com/errata/RHSA-2018:0855 https://access.redhat.com/security/cve/CVE-2017-6464 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464 https://linux.oracle.com/cve/CVE-2017-6464.html https://linux.oracle.com/errata/ELSA-2018-0855.html https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc https://support.apple.com/HT208144 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us https://ubuntu.com/security/notices/USN-3349-1
|
ntpdate |
CVE-2018-7185 |
LOW |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.13 |
Expand...http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html http://support.ntp.org/bin/view/Main/NtpBug3454 http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S http://www.kb.cert.org/vuls/id/961909 http://www.securityfocus.com/archive/1/541824/100/0/threaded http://www.securityfocus.com/bid/103339 https://access.redhat.com/security/cve/CVE-2018-7185 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185 https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc https://security.gentoo.org/glsa/201805-12 https://security.netapp.com/advisory/ntap-20180626-0001/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us https://ubuntu.com/security/notices/USN-3707-1 https://ubuntu.com/security/notices/USN-3707-2 https://usn.ubuntu.com/3707-1/ https://usn.ubuntu.com/3707-2/ https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://www.synology.com/support/security/Synology_SA_18_13
|
openssh-client |
CVE-2016-6515 |
MEDIUM |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.8 |
Expand...http://openwall.com/lists/oss-security/2016/08/01/2 http://packetstormsecurity.com/files/140070/OpenSSH-7.2-Denial-Of-Service.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/92212 http://www.securitytracker.com/id/1036487 https://access.redhat.com/errata/RHSA-2017:2029 https://access.redhat.com/security/cve/CVE-2016-6515 https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6515 https://github.com/openssh/openssh-portable/commit/fcd135c9df440bcd2d5870405ad3311743d78d97 https://linux.oracle.com/cve/CVE-2016-6515.html https://linux.oracle.com/errata/ELSA-2017-2029.html https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2L6RW34VFNXYNVVN2CN73YAGJ5VMTFU/ https://security.FreeBSD.org/advisories/FreeBSD-SA-17:06.openssh.asc https://security.netapp.com/advisory/ntap-20171130-0003/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03779en_us https://ubuntu.com/security/notices/USN-3061-1 https://www.exploit-db.com/exploits/40888/
|
openssh-client |
CVE-2018-20685 |
MEDIUM |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.12 |
Expand...http://www.securityfocus.com/bid/106531 https://access.redhat.com/errata/RHSA-2019:3702 https://access.redhat.com/security/cve/CVE-2018-20685 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685 https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2 https://linux.oracle.com/cve/CVE-2018-20685.html https://linux.oracle.com/errata/ELSA-2019-3702.html https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html https://security.gentoo.org/glsa/201903-16 https://security.gentoo.org/glsa/202007-53 https://security.netapp.com/advisory/ntap-20190215-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://ubuntu.com/security/notices/USN-3885-1 https://usn.ubuntu.com/3885-1/ https://www.debian.org/security/2019/dsa-4387 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
openssh-client |
CVE-2019-6109 |
MEDIUM |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.12 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html https://access.redhat.com/errata/RHSA-2019:3702 https://access.redhat.com/security/cve/CVE-2019-6109 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109 https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c https://linux.oracle.com/cve/CVE-2019-6109.html https://linux.oracle.com/errata/ELSA-2019-3702.html https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/ https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html https://security.gentoo.org/glsa/201903-16 https://security.netapp.com/advisory/ntap-20190213-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://ubuntu.com/security/notices/USN-3885-1 https://usn.ubuntu.com/3885-1/ https://www.debian.org/security/2019/dsa-4387 https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
openssh-client |
CVE-2015-8325 |
LOW |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.7 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2588.html http://rhn.redhat.com/errata/RHSA-2017-0641.html http://www.debian.org/security/2016/dsa-3550 http://www.securityfocus.com/bid/86187 http://www.securitytracker.com/id/1036487 https://access.redhat.com/security/cve/CVE-2015-8325 https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755 https://bugzilla.redhat.com/show_bug.cgi?id=1328012 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325 https://linux.oracle.com/cve/CVE-2015-8325.html https://linux.oracle.com/errata/ELSA-2017-0641.html https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325.html https://security-tracker.debian.org/tracker/CVE-2015-8325 https://security.gentoo.org/glsa/201612-18 https://security.netapp.com/advisory/ntap-20180628-0001/ https://ubuntu.com/security/notices/USN-2966-1
|
openssh-client |
CVE-2016-10009 |
LOW |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.10 |
Expand...http://packetstormsecurity.com/files/140261/OpenSSH-Arbitrary-Library-Loading.html http://www.openwall.com/lists/oss-security/2016/12/19/2 http://www.securityfocus.com/bid/94968 http://www.securitytracker.com/id/1037490 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637 https://access.redhat.com/errata/RHSA-2017:2029 https://access.redhat.com/security/cve/CVE-2016-10009 https://bugs.chromium.org/p/project-zero/issues/detail?id=1009 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009 https://github.com/openbsd/src/commit/9476ce1dd37d3c3218d5640b74c34c65e5f4efe5 https://linux.oracle.com/cve/CVE-2016-10009.html https://linux.oracle.com/errata/ELSA-2017-2029.html https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html https://security.FreeBSD.org/advisories/FreeBSD-SA-17:01.openssh.asc https://security.netapp.com/advisory/ntap-20171130-0002/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us https://ubuntu.com/security/notices/USN-3538-1 https://usn.ubuntu.com/3538-1/ https://www.exploit-db.com/exploits/40963/ https://www.openssh.com/txt/release-7.4
|
openssh-client |
CVE-2016-10011 |
LOW |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.10 |
Expand...http://www.openwall.com/lists/oss-security/2016/12/19/2 http://www.securityfocus.com/bid/94977 http://www.securitytracker.com/id/1037490 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637 https://access.redhat.com/errata/RHSA-2017:2029 https://access.redhat.com/security/cve/CVE-2016-10011 https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10011 https://github.com/openbsd/src/commit/ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9 https://linux.oracle.com/cve/CVE-2016-10011.html https://linux.oracle.com/errata/ELSA-2017-2029.html https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html https://security.netapp.com/advisory/ntap-20171130-0002/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us https://ubuntu.com/security/notices/USN-3538-1 https://www.openssh.com/txt/release-7.4
|
openssh-client |
CVE-2016-10012 |
LOW |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.10 |
Expand...http://www.openwall.com/lists/oss-security/2016/12/19/2 http://www.securityfocus.com/bid/94975 http://www.securitytracker.com/id/1037490 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637 https://access.redhat.com/errata/RHSA-2017:2029 https://access.redhat.com/security/cve/CVE-2016-10012 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012 https://github.com/openbsd/src/commit/3095060f479b86288e31c79ecbc5131a66bcd2f9 https://linux.oracle.com/cve/CVE-2016-10012.html https://linux.oracle.com/errata/ELSA-2017-2029.html https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html https://security.netapp.com/advisory/ntap-20171130-0002/ https://support.f5.com/csp/article/K62201745?utm_source=f5support&utm_medium=RSS https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us https://ubuntu.com/security/notices/USN-3538-1 https://www.openssh.com/txt/release-7.4
|
openssh-client |
CVE-2016-10708 |
LOW |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.11 |
Expand...http://blog.swiecki.net/2018/01/fuzzing-tcp-servers.html http://www.securityfocus.com/bid/102780 https://access.redhat.com/security/cve/CVE-2016-10708 https://anongit.mindrot.org/openssh.git/commit/?id=28652bca29046f62c7045e933e6b931de1d16737 https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10708 https://kc.mcafee.com/corporate/index?page=content&id=SB10284 https://lists.debian.org/debian-lts-announce/2018/01/msg00031.html https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html https://security.netapp.com/advisory/ntap-20180423-0003/ https://support.f5.com/csp/article/K32485746?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-3809-1 https://usn.ubuntu.com/3809-1/ https://www.openssh.com/releasenotes.html
|
openssh-client |
CVE-2016-1908 |
LOW |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.7 |
Expand...http://openwall.com/lists/oss-security/2016/01/15/13 http://rhn.redhat.com/errata/RHSA-2016-0465.html http://rhn.redhat.com/errata/RHSA-2016-0741.html http://seclists.org/oss-sec/2016/q1/115 http://www.openssh.com/txt/release-7.2 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/84427 http://www.securitytracker.com/id/1034705 https://access.redhat.com/security/cve/CVE-2016-1908 https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c https://bugzilla.redhat.com/show_bug.cgi?id=1298741 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1908 https://linux.oracle.com/cve/CVE-2016-1908.html https://linux.oracle.com/errata/ELSA-2016-0741.html https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html https://lists.mindrot.org/pipermail/openssh-unix-dev/2016-January/034684.html https://security.gentoo.org/glsa/201612-18 https://thejh.net/written-stuff/openssh-6.8-xsecurity https://ubuntu.com/security/notices/USN-2966-1
|
openssh-client |
CVE-2016-3115 |
LOW |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.7 |
Expand...http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c.diff?r1=1.281&r2=1.282&f=h http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183101.html http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183122.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178838.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179924.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180491.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184264.html http://packetstormsecurity.com/files/136234/OpenSSH-7.2p1-xauth-Command-Injection-Bypass.html http://rhn.redhat.com/errata/RHSA-2016-0465.html http://rhn.redhat.com/errata/RHSA-2016-0466.html http://seclists.org/fulldisclosure/2016/Mar/46 http://seclists.org/fulldisclosure/2016/Mar/47 http://www.openssh.com/txt/x11fwd.adv http://www.openwall.com/lists/oss-security/2016/03/10/16 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/84314 http://www.securitytracker.com/id/1035249 https://access.redhat.com/security/cve/CVE-2016-3115 https://bto.bluecoat.com/security-advisory/sa121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115 https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115 https://linux.oracle.com/cve/CVE-2016-3115.html https://linux.oracle.com/errata/ELSA-2016-3531.html https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html https://security.gentoo.org/glsa/201612-18 https://ubuntu.com/security/notices/USN-2966-1 https://www.exploit-db.com/exploits/39569/ https://www.freebsd.org/security/advisories/FreeBSD-SA-16:14.openssh.asc
|
openssh-client |
CVE-2016-6210 |
LOW |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.8 |
Expand...http://seclists.org/fulldisclosure/2016/Jul/51 http://www.debian.org/security/2016/dsa-3626 http://www.securityfocus.com/bid/91812 http://www.securitytracker.com/id/1036319 https://access.redhat.com/errata/RHSA-2017:2029 https://access.redhat.com/errata/RHSA-2017:2563 https://access.redhat.com/security/cve/CVE-2016-6210 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210 https://linux.oracle.com/cve/CVE-2016-6210.html https://linux.oracle.com/errata/ELSA-2017-2563.html https://security.gentoo.org/glsa/201612-18 https://security.netapp.com/advisory/ntap-20190206-0001/ https://ubuntu.com/security/notices/USN-3061-1 https://www.exploit-db.com/exploits/40113/ https://www.exploit-db.com/exploits/40136/ https://www.openssh.com/txt/release-7.3
|
openssh-client |
CVE-2017-15906 |
LOW |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.10 |
Expand...http://www.securityfocus.com/bid/101552 https://access.redhat.com/errata/RHSA-2018:0980 https://access.redhat.com/security/cve/CVE-2017-15906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15906 https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19 https://linux.oracle.com/cve/CVE-2017-15906.html https://linux.oracle.com/errata/ELSA-2018-0980.html https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html https://security.gentoo.org/glsa/201801-05 https://security.netapp.com/advisory/ntap-20180423-0004/ https://ubuntu.com/security/notices/USN-3538-1 https://www.openssh.com/txt/release-7.6 https://www.oracle.com/security-alerts/cpujan2020.html https://xorl.wordpress.com/2017/11/13/openssh-sftp-server-remote-security-vulnerability/
|
openssh-client |
CVE-2018-15473 |
LOW |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.11 |
Expand...http://www.openwall.com/lists/oss-security/2018/08/15/5 http://www.securityfocus.com/bid/105140 http://www.securitytracker.com/id/1041487 https://access.redhat.com/errata/RHSA-2019:0711 https://access.redhat.com/errata/RHSA-2019:2143 https://access.redhat.com/security/cve/CVE-2018-15473 https://bugs.debian.org/906236 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15473 https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 https://linux.oracle.com/cve/CVE-2018-15473.html https://linux.oracle.com/errata/ELSA-2019-2143.html https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011 https://security.gentoo.org/glsa/201810-03 https://security.netapp.com/advisory/ntap-20181101-0001/ https://ubuntu.com/security/notices/USN-3809-1 https://usn.ubuntu.com/3809-1/ https://www.debian.org/security/2018/dsa-4280 https://www.exploit-db.com/exploits/45210/ https://www.exploit-db.com/exploits/45233/ https://www.exploit-db.com/exploits/45939/ https://www.oracle.com/security-alerts/cpujan2020.html
|
openssh-client |
CVE-2019-6111 |
LOW |
1:6.6p1-2ubuntu2.6 |
1:6.6p1-2ubuntu2.13 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html http://www.openwall.com/lists/oss-security/2019/04/18/1 http://www.securityfocus.com/bid/106741 https://access.redhat.com/errata/RHSA-2019:3702 https://access.redhat.com/security/cve/CVE-2019-6111 https://bugzilla.redhat.com/show_bug.cgi?id=1677794 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111 https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c https://linux.oracle.com/cve/CVE-2019-6111.html https://linux.oracle.com/errata/ELSA-2019-3702.html https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23@%3Cdev.mina.apache.org%3E https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b@%3Cdev.mina.apache.org%3E https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/ https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html https://security.gentoo.org/glsa/201903-16 https://security.netapp.com/advisory/ntap-20190213-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://ubuntu.com/security/notices/USN-3885-1 https://ubuntu.com/security/notices/USN-3885-2 https://usn.ubuntu.com/3885-1/ https://usn.ubuntu.com/3885-2/ https://www.debian.org/security/2019/dsa-4387 https://www.exploit-db.com/exploits/46193/ https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
openssl |
CVE-2016-2107 |
HIGH |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.19 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://source.android.com/security/bulletin/2016-07-01.html http://support.citrix.com/article/CTX212736 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html http://www.debian.org/security/2016/dsa-3566 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/89760 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035721 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103 http://www.ubuntu.com/usn/USN-2959-1 https://access.redhat.com/security/cve/CVE-2016-2107 https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/ https://bto.bluecoat.com/security-advisory/sa123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107 https://git.openssl.org/?p=openssl.git;a=commit;h=68595c0c2886e7942a14f98c17a55a88afb6c292 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 https://kc.mcafee.com/corporate/index?page=content&id=SB10160 https://linux.oracle.com/cve/CVE-2016-2107.html https://linux.oracle.com/errata/ELSA-2016-3571.html https://openssl.org/news/secadv/20160503.txt https://security.gentoo.org/glsa/201612-16 https://security.netapp.com/advisory/ntap-20160504-0001/ https://support.apple.com/HT206903 https://ubuntu.com/security/notices/USN-2959-1 https://www.exploit-db.com/exploits/39768/ https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc https://www.openssl.org/news/secadv/20160503.txt https://www.tenable.com/security/tns-2016-18
|
openssl |
CVE-2016-2108 |
HIGH |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.19 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-2056.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://source.android.com/security/bulletin/2016-07-01.html http://support.citrix.com/article/CTX212736 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl http://www.debian.org/security/2016/dsa-3566 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/89752 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035721 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103 http://www.ubuntu.com/usn/USN-2959-1 https://access.redhat.com/errata/RHSA-2016:1137 https://access.redhat.com/errata/RHSA-2017:0193 https://access.redhat.com/errata/RHSA-2017:0194 https://access.redhat.com/security/cve/CVE-2016-2108 https://bto.bluecoat.com/security-advisory/sa123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108 https://git.openssl.org/?p=openssl.git;a=commit;h=3661bb4e7934668bd99ca777ea8b30eedfafa871 https://git.openssl.org/?p=openssl.git;a=commit;h=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 https://linux.oracle.com/cve/CVE-2016-2108.html https://linux.oracle.com/errata/ELSA-2016-3571.html https://openssl.org/news/secadv/20160503.txt https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067&languageid=en-fr https://security.gentoo.org/glsa/201612-16 https://security.netapp.com/advisory/ntap-20160504-0001/ https://support.apple.com/HT206903 https://ubuntu.com/security/notices/USN-2959-1 https://www.openssl.org/news/secadv/20160503.txt https://www.tenable.com/security/tns-2016-18
|
openssl |
CVE-2016-6304 |
HIGH |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html http://rhn.redhat.com/errata/RHSA-2016-1940.html http://rhn.redhat.com/errata/RHSA-2016-2802.html http://rhn.redhat.com/errata/RHSA-2017-1415.html http://rhn.redhat.com/errata/RHSA-2017-1659.html http://seclists.org/fulldisclosure/2016/Dec/47 http://seclists.org/fulldisclosure/2016/Oct/62 http://seclists.org/fulldisclosure/2017/Jul/31 http://security.360.cn/cve/CVE-2016-6304/ http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/93150 http://www.securitytracker.com/id/1036878 http://www.securitytracker.com/id/1037640 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/errata/RHSA-2017:1801 https://access.redhat.com/errata/RHSA-2017:1802 https://access.redhat.com/errata/RHSA-2017:2493 https://access.redhat.com/errata/RHSA-2017:2494 https://access.redhat.com/security/cve/CVE-2016-6304 https://bto.bluecoat.com/security-advisory/sa132 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304 https://git.openssl.org/?p=openssl.git;a=commit;h=2c0d295e26306e15a92eb23a84a1802005c1c137 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10171 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://linux.oracle.com/cve/CVE-2016-6304.html https://linux.oracle.com/errata/ELSA-2016-3621.html https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://security.gentoo.org/glsa/201612-16 https://ubuntu.com/security/notices/USN-3087-1 https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.openssl.org/news/secadv/20160922.txt https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
openssl |
CVE-2016-2109 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.19 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-2056.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl http://www.debian.org/security/2016/dsa-3566 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/87940 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035721 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103 http://www.ubuntu.com/usn/USN-2959-1 https://access.redhat.com/security/cve/CVE-2016-2109 https://bto.bluecoat.com/security-advisory/sa123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109 https://git.openssl.org/?p=openssl.git;a=commit;h=c62981390d6cf9e3d612c489b8b77c2913b25807 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 https://kc.mcafee.com/corporate/index?page=content&id=SB10160 https://linux.oracle.com/cve/CVE-2016-2109.html https://linux.oracle.com/errata/ELSA-2016-3576.html https://openssl.org/news/secadv/20160503.txt https://security.gentoo.org/glsa/201612-16 https://security.netapp.com/advisory/ntap-20160504-0001/ https://source.android.com/security/bulletin/2017-07-01 https://support.apple.com/HT206903 https://ubuntu.com/security/notices/USN-2959-1 https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc https://www.openssl.org/news/secadv/20160503.txt https://www.tenable.com/security/tns-2016-18
|
openssl |
CVE-2016-2842 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.18 |
Expand...http://marc.info/?l=bugtraq&m=145983526810210&w=2 http://marc.info/?l=bugtraq&m=146108058503441&w=2 http://openssl.org/news/secadv/20160301.txt http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/84169 https://access.redhat.com/security/cve/CVE-2016-2842 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2842 https://git.openssl.org/?p=openssl.git;a=commit;h=578b956fe741bf8e84055547b1e83c28dd902c73 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kc.mcafee.com/corporate/index?page=content&id=SB10152 https://linux.oracle.com/cve/CVE-2016-2842.html https://linux.oracle.com/errata/ELSA-2016-3571.html https://security.netapp.com/advisory/ntap-20160321-0001/
|
openssl |
CVE-2016-6303 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/92984 http://www.securitytracker.com/id/1036885 https://access.redhat.com/security/cve/CVE-2016-6303 https://bto.bluecoat.com/security-advisory/sa132 https://bugzilla.redhat.com/show_bug.cgi?id=1370146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303 https://git.openssl.org/?p=openssl.git;a=commit;h=55d83bf7c10c7b205fffa23fa7c3977491e56c07 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://ubuntu.com/security/notices/USN-3087-1 https://www.openssl.org/news/secadv/20160922.txt https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
openssl |
CVE-2016-6306 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://rhn.redhat.com/errata/RHSA-2016-1940.html http://seclists.org/fulldisclosure/2017/Jul/31 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/93153 http://www.securitytracker.com/id/1036885 http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 https://access.redhat.com/errata/RHSA-2018:2185 https://access.redhat.com/errata/RHSA-2018:2186 https://access.redhat.com/errata/RHSA-2018:2187 https://access.redhat.com/security/cve/CVE-2016-6306 https://bto.bluecoat.com/security-advisory/sa132 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306 https://git.openssl.org/?p=openssl.git;a=commit;h=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://linux.oracle.com/cve/CVE-2016-6306.html https://linux.oracle.com/errata/ELSA-2016-3627.html https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://security.gentoo.org/glsa/201612-16 https://support.f5.com/csp/article/K90492697 https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us https://ubuntu.com/security/notices/USN-3087-1 https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.openssl.org/news/secadv/20160922.txt https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
openssl |
CVE-2016-7056 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.22 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html http://www.securityfocus.com/bid/95375 http://www.securitytracker.com/id/1037575 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1801 https://access.redhat.com/errata/RHSA-2017:1802 https://access.redhat.com/security/cve/CVE-2016-7056 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7056 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7056 https://eprint.iacr.org/2016/1195 https://eprint.iacr.org/2016/1195.pdf https://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/033_libcrypto.patch.sig https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/016_libcrypto.patch.sig https://git.openssl.org/?p=openssl.git;a=commit;h=8aed2a7548362e88e84a7feb795a3a97e8395008 https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7056.html https://seclists.org/oss-sec/2017/q1/52 https://security-tracker.debian.org/tracker/CVE-2016-7056 https://ubuntu.com/security/notices/USN-3181-1 https://www.debian.org/security/2017/dsa-3773
|
openssl |
CVE-2017-3731 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.22 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-0286.html http://www.debian.org/security/2017/dsa-3773 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.securityfocus.com/bid/95813 http://www.securitytracker.com/id/1037717 https://access.redhat.com/errata/RHSA-2018:2185 https://access.redhat.com/errata/RHSA-2018:2186 https://access.redhat.com/errata/RHSA-2018:2187 https://access.redhat.com/security/cve/CVE-2017-3731 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731 https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21 https://linux.oracle.com/cve/CVE-2017-3731.html https://linux.oracle.com/errata/ELSA-2017-0286.html https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc https://security.gentoo.org/glsa/201702-07 https://security.netapp.com/advisory/ntap-20171019-0002/ https://security.paloaltonetworks.com/CVE-2017-3731 https://source.android.com/security/bulletin/pixel/2017-11-01 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us https://ubuntu.com/security/notices/USN-3181-1 https://www.openssl.org/news/secadv/20170126.txt https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.tenable.com/security/tns-2017-04
|
openssl |
CVE-2018-0739 |
MEDIUM |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.24 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/103518 http://www.securityfocus.com/bid/105609 http://www.securitytracker.com/id/1040576 https://access.redhat.com/errata/RHSA-2018:3090 https://access.redhat.com/errata/RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/errata/RHSA-2019:1711 https://access.redhat.com/errata/RHSA-2019:1712 https://access.redhat.com/security/cve/CVE-2018-0739 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9310d45087ae546e27e61ddf8f6367f29848220d https://linux.oracle.com/cve/CVE-2018-0739.html https://linux.oracle.com/errata/ELSA-2018-4228.html https://lists.debian.org/debian-lts-announce/2018/03/msg00033.html https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/ https://security.gentoo.org/glsa/201811-21 https://security.gentoo.org/glsa/202007-53 https://security.netapp.com/advisory/ntap-20180330-0002/ https://security.netapp.com/advisory/ntap-20180726-0002/ https://securityadvisories.paloaltonetworks.com/Home/Detail/133 https://ubuntu.com/security/notices/USN-3611-1 https://ubuntu.com/security/notices/USN-3611-2 https://usn.ubuntu.com/3611-1/ https://usn.ubuntu.com/3611-2/ https://www.debian.org/security/2018/dsa-4157 https://www.debian.org/security/2018/dsa-4158 https://www.openssl.org/news/secadv/20180327.txt https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2018-04 https://www.tenable.com/security/tns-2018-06 https://www.tenable.com/security/tns-2018-07
|
openssl |
CVE-2016-0702 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.18 |
Expand...http://cachebleed.info http://cachebleed.info/ http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html http://marc.info/?l=bugtraq&m=145889460330120&w=2 http://openssl.org/news/secadv/20160301.txt http://rhn.redhat.com/errata/RHSA-2016-2957.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl http://www.debian.org/security/2016/dsa-3500 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html http://www.securitytracker.com/id/1035133 http://www.ubuntu.com/usn/USN-2914-1 https://access.redhat.com/security/cve/CVE-2016-0702 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702 https://git.openssl.org/?p=openssl.git;a=commit;h=708dc2f1291e104fe4eef810bb8ffc1fae5b19c1 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 https://linux.oracle.com/cve/CVE-2016-0702.html https://linux.oracle.com/errata/ELSA-2016-0301.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc https://security.gentoo.org/glsa/201603-15 https://ssrg.nicta.com.au/projects/TS/cachebleed/ https://ubuntu.com/security/notices/USN-2914-1 https://www.openssl.org/news/secadv/20160301.txt
|
openssl |
CVE-2016-0705 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.18 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html http://marc.info/?l=bugtraq&m=145889460330120&w=2 http://marc.info/?l=bugtraq&m=145983526810210&w=2 http://marc.info/?l=bugtraq&m=146108058503441&w=2 http://openssl.org/news/secadv/20160301.txt http://rhn.redhat.com/errata/RHSA-2016-2957.html http://source.android.com/security/bulletin/2016-05-01.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl http://www.debian.org/security/2016/dsa-3500 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html http://www.securityfocus.com/bid/83754 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035133 http://www.ubuntu.com/usn/USN-2914-1 https://access.redhat.com/errata/RHSA-2018:2568 https://access.redhat.com/errata/RHSA-2018:2575 https://access.redhat.com/errata/RHSA-2018:2713 https://access.redhat.com/security/cve/CVE-2016-0705 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705 https://git.openssl.org/?p=openssl.git;a=commit;h=6c88c71b4e4825c7bc0489306d062d017634eb88 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 https://linux.oracle.com/cve/CVE-2016-0705.html https://linux.oracle.com/errata/ELSA-2016-0301.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc https://security.gentoo.org/glsa/201603-15 https://ubuntu.com/security/notices/USN-2914-1 https://www.openssl.org/news/secadv/20160301.txt
|
openssl |
CVE-2016-0797 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.18 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html http://marc.info/?l=bugtraq&m=145889460330120&w=2 http://openssl.org/news/secadv/20160301.txt http://rhn.redhat.com/errata/RHSA-2016-2957.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl http://www.debian.org/security/2016/dsa-3500 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/83763 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035133 http://www.ubuntu.com/usn/USN-2914-1 https://access.redhat.com/security/cve/CVE-2016-0797 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797 https://git.openssl.org/?p=openssl.git;a=commit;h=c175308407858afff3fc8c2e5e085d94d12edc7d https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 https://kc.mcafee.com/corporate/index?page=content&id=SB10156 https://linux.oracle.com/cve/CVE-2016-0797.html https://linux.oracle.com/errata/ELSA-2016-0302.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc https://security.gentoo.org/glsa/201603-15 https://ubuntu.com/security/notices/USN-2914-1 https://www.openssl.org/news/secadv/20160301.txt
|
openssl |
CVE-2016-0798 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.18 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html http://openssl.org/news/secadv/20160301.txt http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl http://www.debian.org/security/2016/dsa-3500 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/83705 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035133 http://www.ubuntu.com/usn/USN-2914-1 https://access.redhat.com/security/cve/CVE-2016-0798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798 https://git.openssl.org/?p=openssl.git;a=commit;h=259b664f950c2ba66fbf4b0fe5281327904ead21 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc https://security.gentoo.org/glsa/201603-15 https://ubuntu.com/security/notices/USN-2914-1 https://www.openssl.org/news/secadv/20160301.txt
|
openssl |
CVE-2016-0799 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.18 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://marc.info/?l=bugtraq&m=145983526810210&w=2 http://marc.info/?l=bugtraq&m=146108058503441&w=2 http://openssl.org/news/secadv/20160301.txt http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl http://www.debian.org/security/2016/dsa-3500 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/83755 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035133 http://www.ubuntu.com/usn/USN-2914-1 https://access.redhat.com/security/cve/CVE-2016-0799 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799 https://git.openssl.org/?p=openssl.git;a=commit;h=578b956fe741bf8e84055547b1e83c28dd902c73 https://guidovranken.wordpress.com/2016/02/27/openssl-cve-2016-0799-heap-corruption-via-bio_printf/ https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 https://linux.oracle.com/cve/CVE-2016-0799.html https://linux.oracle.com/errata/ELSA-2016-3576.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc https://security.gentoo.org/glsa/201603-15 https://ubuntu.com/security/notices/USN-2914-1 https://www.openssl.org/news/secadv/20160301.txt
|
openssl |
CVE-2016-2105 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.19 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-1648.html http://rhn.redhat.com/errata/RHSA-2016-1649.html http://rhn.redhat.com/errata/RHSA-2016-1650.html http://rhn.redhat.com/errata/RHSA-2016-2056.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl http://www.debian.org/security/2016/dsa-3566 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/89757 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035721 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103 http://www.ubuntu.com/usn/USN-2959-1 https://access.redhat.com/security/cve/CVE-2016-2105 https://bto.bluecoat.com/security-advisory/sa123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105 https://git.openssl.org/?p=openssl.git;a=commit;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kc.mcafee.com/corporate/index?page=content&id=SB10160 https://linux.oracle.com/cve/CVE-2016-2105.html https://linux.oracle.com/errata/ELSA-2016-3576.html https://openssl.org/news/secadv/20160503.txt https://security.gentoo.org/glsa/201612-16 https://security.netapp.com/advisory/ntap-20160504-0001/ https://source.android.com/security/bulletin/pixel/2017-11-01 https://support.apple.com/HT206903 https://ubuntu.com/security/notices/USN-2959-1 https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc https://www.openssl.org/news/secadv/20160503.txt https://www.tenable.com/security/tns-2016-18
|
openssl |
CVE-2016-2106 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.19 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html http://rhn.redhat.com/errata/RHSA-2016-0722.html http://rhn.redhat.com/errata/RHSA-2016-0996.html http://rhn.redhat.com/errata/RHSA-2016-1648.html http://rhn.redhat.com/errata/RHSA-2016-1649.html http://rhn.redhat.com/errata/RHSA-2016-1650.html http://rhn.redhat.com/errata/RHSA-2016-2056.html http://rhn.redhat.com/errata/RHSA-2016-2073.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl http://www.debian.org/security/2016/dsa-3566 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/89744 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1035721 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103 http://www.ubuntu.com/usn/USN-2959-1 https://access.redhat.com/security/cve/CVE-2016-2106 https://bto.bluecoat.com/security-advisory/sa123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106 https://git.openssl.org/?p=openssl.git;a=commit;h=3f3582139fbb259a1c3cbb0a25236500a409bf26 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 https://kc.mcafee.com/corporate/index?page=content&id=SB10160 https://linux.oracle.com/cve/CVE-2016-2106.html https://linux.oracle.com/errata/ELSA-2016-3576.html https://openssl.org/news/secadv/20160503.txt https://security.gentoo.org/glsa/201612-16 https://security.netapp.com/advisory/ntap-20160504-0001/ https://source.android.com/security/bulletin/pixel/2017-11-01 https://support.apple.com/HT206903 https://ubuntu.com/security/notices/USN-2959-1 https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc https://www.openssl.org/news/secadv/20160503.txt https://www.tenable.com/security/tns-2016-18
|
openssl |
CVE-2016-2177 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.22 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://rhn.redhat.com/errata/RHSA-2016-1940.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://rhn.redhat.com/errata/RHSA-2017-1659.html http://seclists.org/fulldisclosure/2017/Jul/31 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.openwall.com/lists/oss-security/2016/06/08/9 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/archive/1/540957/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/540957/100/0/threaded http://www.securityfocus.com/bid/91319 http://www.securitytracker.com/id/1036088 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 http://www.ubuntu.com/usn/USN-3181-1 https://access.redhat.com/errata/RHSA-2017:0193 https://access.redhat.com/errata/RHSA-2017:0194 https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://bto.bluecoat.com/security-advisory/sa132 https://bugzilla.redhat.com/show_bug.cgi?id=1341705 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177 https://git.openssl.org/?p=openssl.git;a=commit;h=a004e72b95835136d3f1ea90517f706c24c03da7 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03763en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10165 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://linux.oracle.com/cve/CVE-2016-2177.html https://linux.oracle.com/errata/ELSA-2016-3627.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://security.gentoo.org/glsa/201612-16 https://support.f5.com/csp/article/K23873366 https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us https://ubuntu.com/security/notices/USN-3087-1 https://ubuntu.com/security/notices/USN-3181-1 https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/ https://www.openssl.org/news/secadv/20160922.txt https://www.schneider-electric.com/en/download/document/SEVD-2018-137-01/ https://www.schneider-electric.com/en/download/document/SEVD-2018-144-01/ https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
openssl |
CVE-2016-2178 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://eprint.iacr.org/2016/594 http://eprint.iacr.org/2016/594.pdf http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://rhn.redhat.com/errata/RHSA-2016-1940.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://rhn.redhat.com/errata/RHSA-2017-1659.html http://seclists.org/fulldisclosure/2017/Jul/31 http://seclists.org/oss-sec/2016/q2/493 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.openwall.com/lists/oss-security/2016/06/08/10 http://www.openwall.com/lists/oss-security/2016/06/08/11 http://www.openwall.com/lists/oss-security/2016/06/08/12 http://www.openwall.com/lists/oss-security/2016/06/08/2 http://www.openwall.com/lists/oss-security/2016/06/08/4 http://www.openwall.com/lists/oss-security/2016/06/08/5 http://www.openwall.com/lists/oss-security/2016/06/08/6 http://www.openwall.com/lists/oss-security/2016/06/08/7 http://www.openwall.com/lists/oss-security/2016/06/08/8 http://www.openwall.com/lists/oss-security/2016/06/09/2 http://www.openwall.com/lists/oss-security/2016/06/09/8 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/91081 http://www.securitytracker.com/id/1036054 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 https://access.redhat.com/errata/RHSA-2017:0193 https://access.redhat.com/errata/RHSA-2017:0194 https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2178 https://bto.bluecoat.com/security-advisory/sa132 https://bugzilla.redhat.com/show_bug.cgi?id=1343400 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178 https://git.openssl.org/?p=openssl.git;a=commit;h=399944622df7bd81af62e67ea967c470534090e2 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://linux.oracle.com/cve/CVE-2016-2178.html https://linux.oracle.com/errata/ELSA-2016-3627.html https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://security.gentoo.org/glsa/201612-16 https://support.f5.com/csp/article/K53084033 https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us https://ubuntu.com/security/notices/USN-3087-1 https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.openssl.org/news/secadv/20160922.txt https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
openssl |
CVE-2016-2179 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://rhn.redhat.com/errata/RHSA-2016-1940.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/92987 http://www.securitytracker.com/id/1036689 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-2179 https://bto.bluecoat.com/security-advisory/sa132 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179 https://git.openssl.org/?p=openssl.git;a=commit;h=f5c7f5dfbaf0d2f7d946d0fe86f08e6bcb36ed0d https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://linux.oracle.com/cve/CVE-2016-2179.html https://linux.oracle.com/errata/ELSA-2016-3621.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us https://ubuntu.com/security/notices/USN-3087-1 https://www.openssl.org/news/secadv/20160922.txt https://www.openssl.org/news/vulnerabilities.html#y2017 https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
openssl |
CVE-2016-2180 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://rhn.redhat.com/errata/RHSA-2016-1940.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/92117 http://www.securitytracker.com/id/1036486 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-2180 https://bto.bluecoat.com/security-advisory/sa132 https://bugzilla.redhat.com/show_bug.cgi?id=1359615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180 https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://linux.oracle.com/cve/CVE-2016-2180.html https://linux.oracle.com/errata/ELSA-2016-3621.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://security.gentoo.org/glsa/201612-16 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us https://ubuntu.com/security/notices/USN-3087-1 https://www.openssl.org/news/secadv/20160922.txt https://www.openssl.org/news/vulnerabilities.html#y2017 https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
openssl |
CVE-2016-2181 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://rhn.redhat.com/errata/RHSA-2016-1940.html http://seclists.org/fulldisclosure/2017/Jul/31 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/92982 http://www.securitytracker.com/id/1036690 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 https://access.redhat.com/security/cve/CVE-2016-2181 https://bto.bluecoat.com/security-advisory/sa132 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181 https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://linux.oracle.com/cve/CVE-2016-2181.html https://linux.oracle.com/errata/ELSA-2016-3621.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://support.f5.com/csp/article/K59298921 https://ubuntu.com/security/notices/USN-3087-1 https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.openssl.org/news/secadv/20160922.txt https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
openssl |
CVE-2016-2182 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://rhn.redhat.com/errata/RHSA-2016-1940.html http://seclists.org/fulldisclosure/2017/Jul/31 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/92557 http://www.securitytracker.com/id/1036688 http://www.securitytracker.com/id/1037968 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 https://access.redhat.com/errata/RHSA-2018:2185 https://access.redhat.com/errata/RHSA-2018:2186 https://access.redhat.com/errata/RHSA-2018:2187 https://access.redhat.com/security/cve/CVE-2016-2182 https://bto.bluecoat.com/security-advisory/sa132 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182 https://git.openssl.org/?p=openssl.git;a=commit;h=07bed46f332fce8c1d157689a2cdf915a982ae34 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10171 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://linux.oracle.com/cve/CVE-2016-2182.html https://linux.oracle.com/errata/ELSA-2016-3627.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://source.android.com/security/bulletin/2017-03-01 https://source.android.com/security/bulletin/2017-03-01.html https://support.f5.com/csp/article/K01276005 https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us https://ubuntu.com/security/notices/USN-3087-1 https://ubuntu.com/security/notices/USN-3087-2 https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.openssl.org/news/secadv/20160922.txt https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
openssl |
CVE-2016-2183 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html http://rhn.redhat.com/errata/RHSA-2017-0336.html http://rhn.redhat.com/errata/RHSA-2017-0337.html http://rhn.redhat.com/errata/RHSA-2017-0338.html http://rhn.redhat.com/errata/RHSA-2017-0462.html http://seclists.org/fulldisclosure/2017/Jul/31 http://seclists.org/fulldisclosure/2017/May/105 http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 http://www-01.ibm.com/support/docview.wss?uid=swg21991482 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/archive/1/539885/100/0/threaded http://www.securityfocus.com/archive/1/540341/100/0/threaded http://www.securityfocus.com/archive/1/541104/100/0/threaded http://www.securityfocus.com/archive/1/542005/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded http://www.securityfocus.com/bid/92630 http://www.securityfocus.com/bid/95568 http://www.securitytracker.com/id/1036696 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 http://www.ubuntu.com/usn/USN-3179-1 http://www.ubuntu.com/usn/USN-3194-1 http://www.ubuntu.com/usn/USN-3198-1 http://www.ubuntu.com/usn/USN-3270-1 http://www.ubuntu.com/usn/USN-3372-1 https://access.redhat.com/articles/2548661 https://access.redhat.com/errata/RHSA-2016:1940 https://access.redhat.com/errata/RHSA-2017:1216 https://access.redhat.com/errata/RHSA-2017:2708 https://access.redhat.com/errata/RHSA-2017:2709 https://access.redhat.com/errata/RHSA-2017:2710 https://access.redhat.com/errata/RHSA-2017:3113 https://access.redhat.com/errata/RHSA-2017:3114 https://access.redhat.com/errata/RHSA-2017:3239 https://access.redhat.com/errata/RHSA-2017:3240 https://access.redhat.com/errata/RHSA-2018:2123 https://access.redhat.com/errata/RHSA-2019:1245 https://access.redhat.com/errata/RHSA-2019:2859 https://access.redhat.com/errata/RHSA-2020:0451 https://access.redhat.com/security/cve/CVE-2016-2183 https://access.redhat.com/security/cve/cve-2016-2183 https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/ https://bto.bluecoat.com/security-advisory/sa133 https://bugzilla.redhat.com/show_bug.cgi?id=1369383 https://community.qualys.com/thread/16555 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183 https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10171 https://kc.mcafee.com/corporate/index?page=content&id=SB10186 https://kc.mcafee.com/corporate/index?page=content&id=SB10197 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://kc.mcafee.com/corporate/index?page=content&id=SB10310 https://linux.oracle.com/cve/CVE-2016-2183.html https://linux.oracle.com/errata/ELSA-2018-2123.html https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575 https://seclists.org/bugtraq/2018/Nov/21 https://security-tracker.debian.org/tracker/CVE-2016-2183 https://security.gentoo.org/glsa/201612-16 https://security.gentoo.org/glsa/201701-65 https://security.gentoo.org/glsa/201707-01 https://security.netapp.com/advisory/ntap-20160915-0001/ https://security.netapp.com/advisory/ntap-20170119-0001/ https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613 https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178 https://support.f5.com/csp/article/K13167034 https://sweet32.info/ https://twitter.com/symantec/status/768786631159603200 https://ubuntu.com/security/notices/USN-3087-1 https://ubuntu.com/security/notices/USN-3179-1 https://ubuntu.com/security/notices/USN-3194-1 https://ubuntu.com/security/notices/USN-3198-1 https://ubuntu.com/security/notices/USN-3270-1 https://ubuntu.com/security/notices/USN-3372-1 https://wiki.opendaylight.org/view/Security_Advisories https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.exploit-db.com/exploits/42091/ https://www.ietf.org/mail-archive/web/tls/current/msg04560.html https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008 https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/ https://www.openssl.org/blog/blog/2016/08/24/sweet32/ https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.sigsac.org/ccs/CCS2016/accepted-papers/ https://www.suse.com/security/cve/CVE-2016-2183.html https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21 https://www.tenable.com/security/tns-2017-09 https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
|
openssl |
CVE-2016-6302 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.20 |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://rhn.redhat.com/errata/RHSA-2016-1940.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/92628 http://www.securitytracker.com/id/1036885 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/errata/RHSA-2018:2185 https://access.redhat.com/errata/RHSA-2018:2186 https://access.redhat.com/errata/RHSA-2018:2187 https://access.redhat.com/security/cve/CVE-2016-6302 https://bto.bluecoat.com/security-advisory/sa132 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302 https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://linux.oracle.com/cve/CVE-2016-6302.html https://linux.oracle.com/errata/ELSA-2016-3621.html https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://ubuntu.com/security/notices/USN-3087-1 https://www.openssl.org/news/secadv/20160922.txt https://www.openssl.org/news/vulnerabilities.html#y2017 https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21
|
openssl |
CVE-2016-8610 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.22 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-0286.html http://rhn.redhat.com/errata/RHSA-2017-0574.html http://rhn.redhat.com/errata/RHSA-2017-1415.html http://rhn.redhat.com/errata/RHSA-2017-1659.html http://seclists.org/oss-sec/2016/q4/224 http://security.360.cn/cve/CVE-2016-8610 http://security.360.cn/cve/CVE-2016-8610/ http://www.openwall.com/lists/oss-security/2016/10/24/3 http://www.securityfocus.com/bid/93841 http://www.securitytracker.com/id/1037084 https://access.redhat.com/errata/RHSA-2017:1413 https://access.redhat.com/errata/RHSA-2017:1414 https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/errata/RHSA-2017:1801 https://access.redhat.com/errata/RHSA-2017:1802 https://access.redhat.com/errata/RHSA-2017:2493 https://access.redhat.com/errata/RHSA-2017:2494 https://access.redhat.com/security/cve/CVE-2016-8610 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610 https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401 https://linux.oracle.com/cve/CVE-2016-8610.html https://linux.oracle.com/errata/ELSA-2017-0574.html https://security.360.cn/cve/CVE-2016-8610/ https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc https://security.netapp.com/advisory/ntap-20171130-0001/ https://security.paloaltonetworks.com/CVE-2016-8610 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us https://ubuntu.com/security/notices/USN-3181-1 https://ubuntu.com/security/notices/USN-3183-1 https://ubuntu.com/security/notices/USN-3183-2 https://www.debian.org/security/2017/dsa-3773 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
openssl |
CVE-2017-3735 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.23 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/100515 http://www.securitytracker.com/id/1039726 https://access.redhat.com/errata/RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/security/cve/CVE-2017-3735 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735 https://github.com/openssl/openssl/commit/068b963bb7afc57f5bdd723de0dd15e7795d5822 https://linux.oracle.com/cve/CVE-2017-3735.html https://linux.oracle.com/errata/ELSA-2018-4187.html https://lists.debian.org/debian-lts-announce/2017/11/msg00011.html https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc https://security.gentoo.org/glsa/201712-03 https://security.netapp.com/advisory/ntap-20170927-0001/ https://security.netapp.com/advisory/ntap-20171107-0002/ https://support.apple.com/HT208331 https://ubuntu.com/security/notices/USN-3475-1 https://ubuntu.com/security/notices/USN-3611-2 https://usn.ubuntu.com/3611-2/ https://www.debian.org/security/2017/dsa-4017 https://www.debian.org/security/2017/dsa-4018 https://www.openssl.org/news/secadv/20170828.txt https://www.openssl.org/news/secadv/20171102.txt https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2017-14 https://www.tenable.com/security/tns-2017-15
|
openssl |
CVE-2018-0495 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.26 |
Expand...http://www.securitytracker.com/id/1041144 http://www.securitytracker.com/id/1041147 https://access.redhat.com/errata/RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1296 https://access.redhat.com/errata/RHSA-2019:1297 https://access.redhat.com/errata/RHSA-2019:1543 https://access.redhat.com/errata/RHSA-2019:2237 https://access.redhat.com/security/cve/CVE-2018-0495 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495 https://dev.gnupg.org/T4011 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.38_release_notes https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965 https://linux.oracle.com/cve/CVE-2018-0495.html https://linux.oracle.com/errata/ELSA-2019-2237.html https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html https://ubuntu.com/security/notices/USN-3689-1 https://ubuntu.com/security/notices/USN-3689-2 https://ubuntu.com/security/notices/USN-3692-1 https://ubuntu.com/security/notices/USN-3692-2 https://ubuntu.com/security/notices/USN-3850-1 https://ubuntu.com/security/notices/USN-3850-2 https://usn.ubuntu.com/3689-1/ https://usn.ubuntu.com/3689-2/ https://usn.ubuntu.com/3692-1/ https://usn.ubuntu.com/3692-2/ https://usn.ubuntu.com/3850-1/ https://usn.ubuntu.com/3850-2/ https://www.debian.org/security/2018/dsa-4231 https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
openssl |
CVE-2018-0732 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.26 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/104442 http://www.securitytracker.com/id/1041090 https://access.redhat.com/errata/RHSA-2018:2552 https://access.redhat.com/errata/RHSA-2018:2553 https://access.redhat.com/errata/RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1296 https://access.redhat.com/errata/RHSA-2019:1297 https://access.redhat.com/errata/RHSA-2019:1543 https://access.redhat.com/security/cve/CVE-2018-0732 https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4 https://linux.oracle.com/cve/CVE-2018-0732.html https://linux.oracle.com/errata/ELSA-2018-4249.html https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/ https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/ https://security.gentoo.org/glsa/201811-03 https://security.netapp.com/advisory/ntap-20181105-0001/ https://security.netapp.com/advisory/ntap-20190118-0002/ https://securityadvisories.paloaltonetworks.com/Home/Detail/133 https://ubuntu.com/security/notices/USN-3692-1 https://ubuntu.com/security/notices/USN-3692-2 https://usn.ubuntu.com/3692-1/ https://usn.ubuntu.com/3692-2/ https://www.debian.org/security/2018/dsa-4348 https://www.debian.org/security/2018/dsa-4355 https://www.openssl.org/news/secadv/20180612.txt https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://www.tenable.com/security/tns-2018-12 https://www.tenable.com/security/tns-2018-13 https://www.tenable.com/security/tns-2018-14 https://www.tenable.com/security/tns-2018-17
|
openssl |
CVE-2018-0734 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html http://www.securityfocus.com/bid/105758 https://access.redhat.com/errata/RHSA-2019:2304 https://access.redhat.com/errata/RHSA-2019:3700 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/security/cve/CVE-2018-0734 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=43e6a58d4991a451daf4891ff05a48735df871ac https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7 https://linux.oracle.com/cve/CVE-2018-0734.html https://linux.oracle.com/errata/ELSA-2019-3700.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/ https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ https://nvd.nist.gov/vuln/detail/CVE-2018-0734 https://security.netapp.com/advisory/ntap-20181105-0002/ https://security.netapp.com/advisory/ntap-20190118-0002/ https://security.netapp.com/advisory/ntap-20190423-0002/ https://ubuntu.com/security/notices/USN-3840-1 https://usn.ubuntu.com/3840-1/ https://www.debian.org/security/2018/dsa-4348 https://www.debian.org/security/2018/dsa-4355 https://www.openssl.org/news/secadv/20181030.txt https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2018-16 https://www.tenable.com/security/tns-2018-17
|
openssl |
CVE-2018-0737 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.26 |
Expand...http://www.openwall.com/lists/oss-security/2018/04/16/3 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/103766 http://www.securitytracker.com/id/1040685 https://access.redhat.com/errata/RHSA-2018:3221 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/security/cve/CVE-2018-0737 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787 https://linux.oracle.com/cve/CVE-2018-0737.html https://linux.oracle.com/errata/ELSA-2018-4249.html https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/ https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/ https://security.gentoo.org/glsa/201811-21 https://security.netapp.com/advisory/ntap-20180726-0003/ https://securityadvisories.paloaltonetworks.com/Home/Detail/133 https://ubuntu.com/security/notices/USN-3628-1 https://ubuntu.com/security/notices/USN-3628-2 https://ubuntu.com/security/notices/USN-3692-1 https://ubuntu.com/security/notices/USN-3692-2 https://usn.ubuntu.com/3628-1/ https://usn.ubuntu.com/3628-2/ https://usn.ubuntu.com/3692-1/ https://usn.ubuntu.com/3692-2/ https://www.debian.org/security/2018/dsa-4348 https://www.debian.org/security/2018/dsa-4355 https://www.openssl.org/news/secadv/20180416.txt https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2018-12 https://www.tenable.com/security/tns-2018-13 https://www.tenable.com/security/tns-2018-14 https://www.tenable.com/security/tns-2018-17
|
openssl |
CVE-2018-5407 |
LOW |
1.0.1f-1ubuntu2.16 |
1.0.1f-1ubuntu2.27 |
Expand...http://www.securityfocus.com/bid/105897 https://access.redhat.com/errata/RHSA-2019:0483 https://access.redhat.com/errata/RHSA-2019:0651 https://access.redhat.com/errata/RHSA-2019:0652 https://access.redhat.com/errata/RHSA-2019:2125 https://access.redhat.com/errata/RHSA-2019:3929 https://access.redhat.com/errata/RHSA-2019:3931 https://access.redhat.com/errata/RHSA-2019:3932 https://access.redhat.com/errata/RHSA-2019:3933 https://access.redhat.com/errata/RHSA-2019:3935 https://access.redhat.com/security/cve/CVE-2018-5407 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407 https://eprint.iacr.org/2018/1060.pdf https://github.com/bbbrumley/portsmash https://linux.oracle.com/cve/CVE-2018-5407.html https://linux.oracle.com/errata/ELSA-2019-2125.html https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ https://security.gentoo.org/glsa/201903-10 https://security.netapp.com/advisory/ntap-20181126-0001/ https://support.f5.com/csp/article/K49711130?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-3840-1 https://usn.ubuntu.com/3840-1/ https://www.debian.org/security/2018/dsa-4348 https://www.debian.org/security/2018/dsa-4355 https://www.exploit-db.com/exploits/45785/ https://www.openssl.org/news/secadv/20181112.txt https://www.openwall.com/lists/oss-security/2018/11/01/4 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.tenable.com/security/tns-2018-16 https://www.tenable.com/security/tns-2018-17
|
passwd |
CVE-2016-6252 |
MEDIUM |
1:4.1.5.1-1ubuntu9.1 |
1:4.1.5.1-1ubuntu9.4 |
Expand...http://www.debian.org/security/2017/dsa-3793 http://www.openwall.com/lists/oss-security/2016/07/19/6 http://www.openwall.com/lists/oss-security/2016/07/19/7 http://www.openwall.com/lists/oss-security/2016/07/20/2 http://www.openwall.com/lists/oss-security/2016/07/25/7 http://www.securityfocus.com/bid/92055 https://access.redhat.com/security/cve/CVE-2016-6252 https://bugzilla.suse.com/show_bug.cgi?id=979282 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252 https://github.com/shadow-maint/shadow/issues/27 https://security.gentoo.org/glsa/201706-02 https://ubuntu.com/security/notices/USN-3276-1
|
passwd |
CVE-2017-2616 |
MEDIUM |
1:4.1.5.1-1ubuntu9.1 |
1:4.1.5.1-1ubuntu9.4 |
Expand...http://rhn.redhat.com/errata/RHSA-2017-0654.html http://www.securityfocus.com/bid/96404 http://www.securitytracker.com/id/1038271 https://access.redhat.com/errata/RHSA-2017:0907 https://access.redhat.com/security/cve/CVE-2017-2616 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616 https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891 https://linux.oracle.com/cve/CVE-2017-2616.html https://linux.oracle.com/errata/ELSA-2017-0907.html https://security.gentoo.org/glsa/201706-02 https://ubuntu.com/security/notices/USN-3276-1 https://ubuntu.com/security/notices/USN-3276-3 https://www.debian.org/security/2017/dsa-3793
|
patch |
CVE-2018-1000156 |
MEDIUM |
2.7.1-4ubuntu2.3 |
2.7.1-4ubuntu2.4 |
Expand...http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html http://rachelbythebay.com/w/2018/04/05/bangpatch/ https://access.redhat.com/errata/RHSA-2018:1199 https://access.redhat.com/errata/RHSA-2018:1200 https://access.redhat.com/errata/RHSA-2018:2091 https://access.redhat.com/errata/RHSA-2018:2092 https://access.redhat.com/errata/RHSA-2018:2093 https://access.redhat.com/errata/RHSA-2018:2094 https://access.redhat.com/errata/RHSA-2018:2095 https://access.redhat.com/errata/RHSA-2018:2096 https://access.redhat.com/errata/RHSA-2018:2097 https://access.redhat.com/security/cve/CVE-2018-1000156 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156 https://linux.oracle.com/cve/CVE-2018-1000156.html https://linux.oracle.com/errata/ELSA-2018-1200.html https://lists.debian.org/debian-lts-announce/2018/04/msg00013.html https://nvd.nist.gov/vuln/detail/CVE-2018-1000156 https://rachelbythebay.com/w/2018/04/05/bangpatch/ https://savannah.gnu.org/bugs/index.php?53566 https://seclists.org/bugtraq/2019/Aug/29 https://seclists.org/bugtraq/2019/Jul/54 https://security.gentoo.org/glsa/201904-17 https://twitter.com/kurtseifried/status/982028968877436928 https://ubuntu.com/security/notices/USN-3624-1 https://ubuntu.com/security/notices/USN-3624-2 https://usn.ubuntu.com/3624-1/ https://usn.ubuntu.com/3624-2/
|
patch |
CVE-2016-10713 |
LOW |
2.7.1-4ubuntu2.3 |
2.7.1-4ubuntu2.4 |
Expand...http://www.securityfocus.com/bid/103063 https://access.redhat.com/errata/RHSA-2019:2033 https://access.redhat.com/security/cve/CVE-2016-10713 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10713 https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866 https://linux.oracle.com/cve/CVE-2016-10713.html https://linux.oracle.com/errata/ELSA-2019-2033.html https://savannah.gnu.org/bugs/index.php?45990 https://ubuntu.com/security/notices/USN-3624-1 https://ubuntu.com/security/notices/USN-3624-2 https://usn.ubuntu.com/3624-1/ https://usn.ubuntu.com/3624-2/
|
patch |
CVE-2018-6951 |
LOW |
2.7.1-4ubuntu2.3 |
2.7.1-4ubuntu2.4 |
Expand...http://www.securityfocus.com/bid/103044 https://access.redhat.com/security/cve/CVE-2018-6951 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951 https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a https://nvd.nist.gov/vuln/detail/CVE-2018-6951 https://savannah.gnu.org/bugs/index.php?53132 https://security.gentoo.org/glsa/201904-17 https://ubuntu.com/security/notices/USN-3624-1 https://usn.ubuntu.com/3624-1/
|
perl |
CVE-2016-2381 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076 http://www.debian.org/security/2016/dsa-3501 http://www.gossamer-threads.com/lists/perl/porters/326387 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/83802 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2016-2381 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-2916-1 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html
|
perl |
CVE-2017-12837 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.3 |
Expand...http://www.debian.org/security/2017/dsa-3982 http://www.securityfocus.com/bid/100860 https://access.redhat.com/security/cve/CVE-2017-12837 https://bugzilla.redhat.com/show_bug.cgi?id=1492091 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837 https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5 https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1 https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1 https://rt.perl.org/Public/Bug/Display.html?id=131582 https://rt.perl.org/Public/Bug/Display.html?id=131582 (not yet public) https://security.netapp.com/advisory/ntap-20180426-0001/ https://ubuntu.com/security/notices/USN-3478-1 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl |
CVE-2017-12883 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.3 |
Expand...http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch http://www.debian.org/security/2017/dsa-3982 http://www.securityfocus.com/bid/100852 https://access.redhat.com/security/cve/CVE-2017-12883 https://bugzilla.redhat.com/show_bug.cgi?id=1492093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883 https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1 https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1 https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1 https://rt.perl.org/Public/Bug/Display.html?id=131598 https://security.netapp.com/advisory/ntap-20180426-0001/ https://ubuntu.com/security/notices/USN-3478-1 https://ubuntu.com/security/notices/USN-3478-2 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl |
CVE-2018-12015 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.6 |
Expand...http://seclists.org/fulldisclosure/2019/Mar/49 http://www.securityfocus.com/bid/104423 http://www.securitytracker.com/id/1041048 https://access.redhat.com/errata/RHSA-2019:2097 https://access.redhat.com/security/cve/CVE-2018-12015 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015 https://linux.oracle.com/cve/CVE-2018-12015.html https://linux.oracle.com/errata/ELSA-2019-2097.html https://seclists.org/bugtraq/2019/Mar/42 https://security.netapp.com/advisory/ntap-20180927-0001/ https://support.apple.com/kb/HT209600 https://ubuntu.com/security/notices/USN-3684-1 https://ubuntu.com/security/notices/USN-3684-2 https://usn.ubuntu.com/3684-1/ https://usn.ubuntu.com/3684-2/ https://www.debian.org/security/2018/dsa-4226 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl |
CVE-2018-18311 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.7 |
Expand...http://seclists.org/fulldisclosure/2019/Mar/49 http://www.securityfocus.com/bid/106145 http://www.securitytracker.com/id/1042181 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2019:0001 https://access.redhat.com/errata/RHSA-2019:0010 https://access.redhat.com/errata/RHSA-2019:0109 https://access.redhat.com/errata/RHSA-2019:1790 https://access.redhat.com/errata/RHSA-2019:1942 https://access.redhat.com/errata/RHSA-2019:2400 https://access.redhat.com/security/cve/CVE-2018-18311 https://bugzilla.redhat.com/show_bug.cgi?id=1646730 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311 https://github.com/Perl/perl5/commit/34716e2a6ee2af96078d62b065b7785c001194be https://kc.mcafee.com/corporate/index?page=content&id=SB10278 https://linux.oracle.com/cve/CVE-2018-18311.html https://linux.oracle.com/errata/ELSA-2019-0109.html https://lists.debian.org/debian-lts-announce/2018/11/msg00039.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/ https://metacpan.org/changes/release/SHAY/perl-5.26.3 https://metacpan.org/changes/release/SHAY/perl-5.28.1 https://rt.perl.org/Ticket/Display.html?id=133204 https://seclists.org/bugtraq/2019/Mar/42 https://security.gentoo.org/glsa/201909-01 https://security.netapp.com/advisory/ntap-20190221-0003/ https://support.apple.com/kb/HT209600 https://ubuntu.com/security/notices/USN-3834-1 https://ubuntu.com/security/notices/USN-3834-2 https://usn.ubuntu.com/3834-1/ https://usn.ubuntu.com/3834-2/ https://www.debian.org/security/2018/dsa-4347 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
perl |
CVE-2018-18313 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.7 |
Expand...http://seclists.org/fulldisclosure/2019/Mar/49 http://www.securitytracker.com/id/1042181 https://access.redhat.com/errata/RHSA-2019:0001 https://access.redhat.com/errata/RHSA-2019:0010 https://access.redhat.com/security/cve/CVE-2018-18313 https://bugzilla.redhat.com/show_bug.cgi?id=1646738 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313 https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/ https://metacpan.org/changes/release/SHAY/perl-5.26.3 https://rt.perl.org/Ticket/Display.html?id=133192 https://seclists.org/bugtraq/2019/Mar/42 https://security.gentoo.org/glsa/201909-01 https://security.netapp.com/advisory/ntap-20190221-0003/ https://support.apple.com/kb/HT209600 https://ubuntu.com/security/notices/USN-3834-1 https://ubuntu.com/security/notices/USN-3834-2 https://usn.ubuntu.com/3834-1/ https://usn.ubuntu.com/3834-2/ https://www.debian.org/security/2018/dsa-4347 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl |
CVE-2018-6913 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.4 |
Expand...http://www.securityfocus.com/bid/103953 http://www.securitytracker.com/id/1040681 https://access.redhat.com/security/cve/CVE-2018-6913 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913 https://lists.debian.org/debian-lts-announce/2018/04/msg00009.html https://rt.perl.org/Public/Bug/Display.html?id=131844 https://security.gentoo.org/glsa/201909-01 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/ https://www.debian.org/security/2018/dsa-4172 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl |
CVE-2013-7422 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.1 |
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06 http://www.securityfocus.com/bid/75704 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2013-7422 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422 https://security.gentoo.org/glsa/201507-11 https://support.apple.com/kb/HT205031 https://ubuntu.com/security/notices/USN-2916-1
|
perl |
CVE-2014-4330 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.1 |
Expand...http://advisories.mageia.org/MGASA-2014-0406.html http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html http://seclists.org/fulldisclosure/2014/Sep/84 http://seclists.org/oss-sec/2014/q3/692 http://secunia.com/advisories/61441 http://secunia.com/advisories/61961 http://www.mandriva.com/security/advisories?name=MDVSA-2015:136 http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html http://www.securityfocus.com/archive/1/533543/100/0/threaded http://www.securityfocus.com/bid/70142 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2014-4330 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330 https://exchange.xforce.ibmcloud.com/vulnerabilities/96216 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://metacpan.org/pod/distribution/Data-Dumper/Changes https://ubuntu.com/security/notices/USN-2916-1 https://www.lsexperts.de/advisories/lse-2014-06-10.txt
|
perl |
CVE-2015-8853 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.4 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5 http://www.openwall.com/lists/oss-security/2016/04/20/5 http://www.openwall.com/lists/oss-security/2016/04/20/7 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/86707 https://access.redhat.com/security/cve/CVE-2015-8853 https://bugzilla.redhat.com/show_bug.cgi?id=1329106 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://rt.perl.org/Public/Bug/Display.html?id=123562 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
perl |
CVE-2016-6185 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.4 |
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7 http://www.debian.org/security/2016/dsa-3628 http://www.openwall.com/lists/oss-security/2016/07/07/1 http://www.openwall.com/lists/oss-security/2016/07/08/5 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91685 http://www.securitytracker.com/id/1036260 https://access.redhat.com/security/cve/CVE-2016-6185 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/ https://rt.cpan.org/Public/Bug/Display.html?id=115808 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
perl |
CVE-2017-6512 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.4 |
Expand...http://cpansearch.perl.org/src/JKEENAN/File-Path-2.13/Changes http://security.cucumberlinux.com/security/details.php?id=153 http://www.debian.org/security/2017/dsa-3873 http://www.securityfocus.com/bid/99180 http://www.securitytracker.com/id/1038610 https://access.redhat.com/security/cve/CVE-2017-6512 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512 https://rt.cpan.org/Ticket/Display.html?id=121951 https://security.gentoo.org/glsa/201709-12 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
perl-base |
CVE-2016-2381 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076 http://www.debian.org/security/2016/dsa-3501 http://www.gossamer-threads.com/lists/perl/porters/326387 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/83802 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2016-2381 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-2916-1 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html
|
perl-base |
CVE-2017-12837 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.3 |
Expand...http://www.debian.org/security/2017/dsa-3982 http://www.securityfocus.com/bid/100860 https://access.redhat.com/security/cve/CVE-2017-12837 https://bugzilla.redhat.com/show_bug.cgi?id=1492091 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837 https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5 https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1 https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1 https://rt.perl.org/Public/Bug/Display.html?id=131582 https://rt.perl.org/Public/Bug/Display.html?id=131582 (not yet public) https://security.netapp.com/advisory/ntap-20180426-0001/ https://ubuntu.com/security/notices/USN-3478-1 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl-base |
CVE-2017-12883 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.3 |
Expand...http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch http://www.debian.org/security/2017/dsa-3982 http://www.securityfocus.com/bid/100852 https://access.redhat.com/security/cve/CVE-2017-12883 https://bugzilla.redhat.com/show_bug.cgi?id=1492093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883 https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1 https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1 https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1 https://rt.perl.org/Public/Bug/Display.html?id=131598 https://security.netapp.com/advisory/ntap-20180426-0001/ https://ubuntu.com/security/notices/USN-3478-1 https://ubuntu.com/security/notices/USN-3478-2 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl-base |
CVE-2018-12015 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.6 |
Expand...http://seclists.org/fulldisclosure/2019/Mar/49 http://www.securityfocus.com/bid/104423 http://www.securitytracker.com/id/1041048 https://access.redhat.com/errata/RHSA-2019:2097 https://access.redhat.com/security/cve/CVE-2018-12015 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015 https://linux.oracle.com/cve/CVE-2018-12015.html https://linux.oracle.com/errata/ELSA-2019-2097.html https://seclists.org/bugtraq/2019/Mar/42 https://security.netapp.com/advisory/ntap-20180927-0001/ https://support.apple.com/kb/HT209600 https://ubuntu.com/security/notices/USN-3684-1 https://ubuntu.com/security/notices/USN-3684-2 https://usn.ubuntu.com/3684-1/ https://usn.ubuntu.com/3684-2/ https://www.debian.org/security/2018/dsa-4226 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl-base |
CVE-2018-18311 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.7 |
Expand...http://seclists.org/fulldisclosure/2019/Mar/49 http://www.securityfocus.com/bid/106145 http://www.securitytracker.com/id/1042181 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2019:0001 https://access.redhat.com/errata/RHSA-2019:0010 https://access.redhat.com/errata/RHSA-2019:0109 https://access.redhat.com/errata/RHSA-2019:1790 https://access.redhat.com/errata/RHSA-2019:1942 https://access.redhat.com/errata/RHSA-2019:2400 https://access.redhat.com/security/cve/CVE-2018-18311 https://bugzilla.redhat.com/show_bug.cgi?id=1646730 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311 https://github.com/Perl/perl5/commit/34716e2a6ee2af96078d62b065b7785c001194be https://kc.mcafee.com/corporate/index?page=content&id=SB10278 https://linux.oracle.com/cve/CVE-2018-18311.html https://linux.oracle.com/errata/ELSA-2019-0109.html https://lists.debian.org/debian-lts-announce/2018/11/msg00039.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/ https://metacpan.org/changes/release/SHAY/perl-5.26.3 https://metacpan.org/changes/release/SHAY/perl-5.28.1 https://rt.perl.org/Ticket/Display.html?id=133204 https://seclists.org/bugtraq/2019/Mar/42 https://security.gentoo.org/glsa/201909-01 https://security.netapp.com/advisory/ntap-20190221-0003/ https://support.apple.com/kb/HT209600 https://ubuntu.com/security/notices/USN-3834-1 https://ubuntu.com/security/notices/USN-3834-2 https://usn.ubuntu.com/3834-1/ https://usn.ubuntu.com/3834-2/ https://www.debian.org/security/2018/dsa-4347 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
perl-base |
CVE-2018-18313 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.7 |
Expand...http://seclists.org/fulldisclosure/2019/Mar/49 http://www.securitytracker.com/id/1042181 https://access.redhat.com/errata/RHSA-2019:0001 https://access.redhat.com/errata/RHSA-2019:0010 https://access.redhat.com/security/cve/CVE-2018-18313 https://bugzilla.redhat.com/show_bug.cgi?id=1646738 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313 https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/ https://metacpan.org/changes/release/SHAY/perl-5.26.3 https://rt.perl.org/Ticket/Display.html?id=133192 https://seclists.org/bugtraq/2019/Mar/42 https://security.gentoo.org/glsa/201909-01 https://security.netapp.com/advisory/ntap-20190221-0003/ https://support.apple.com/kb/HT209600 https://ubuntu.com/security/notices/USN-3834-1 https://ubuntu.com/security/notices/USN-3834-2 https://usn.ubuntu.com/3834-1/ https://usn.ubuntu.com/3834-2/ https://www.debian.org/security/2018/dsa-4347 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl-base |
CVE-2018-6913 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.4 |
Expand...http://www.securityfocus.com/bid/103953 http://www.securitytracker.com/id/1040681 https://access.redhat.com/security/cve/CVE-2018-6913 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913 https://lists.debian.org/debian-lts-announce/2018/04/msg00009.html https://rt.perl.org/Public/Bug/Display.html?id=131844 https://security.gentoo.org/glsa/201909-01 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/ https://www.debian.org/security/2018/dsa-4172 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl-base |
CVE-2013-7422 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.1 |
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06 http://www.securityfocus.com/bid/75704 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2013-7422 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422 https://security.gentoo.org/glsa/201507-11 https://support.apple.com/kb/HT205031 https://ubuntu.com/security/notices/USN-2916-1
|
perl-base |
CVE-2014-4330 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.1 |
Expand...http://advisories.mageia.org/MGASA-2014-0406.html http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html http://seclists.org/fulldisclosure/2014/Sep/84 http://seclists.org/oss-sec/2014/q3/692 http://secunia.com/advisories/61441 http://secunia.com/advisories/61961 http://www.mandriva.com/security/advisories?name=MDVSA-2015:136 http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html http://www.securityfocus.com/archive/1/533543/100/0/threaded http://www.securityfocus.com/bid/70142 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2014-4330 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330 https://exchange.xforce.ibmcloud.com/vulnerabilities/96216 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://metacpan.org/pod/distribution/Data-Dumper/Changes https://ubuntu.com/security/notices/USN-2916-1 https://www.lsexperts.de/advisories/lse-2014-06-10.txt
|
perl-base |
CVE-2015-8853 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.4 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5 http://www.openwall.com/lists/oss-security/2016/04/20/5 http://www.openwall.com/lists/oss-security/2016/04/20/7 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/86707 https://access.redhat.com/security/cve/CVE-2015-8853 https://bugzilla.redhat.com/show_bug.cgi?id=1329106 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://rt.perl.org/Public/Bug/Display.html?id=123562 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
perl-base |
CVE-2016-6185 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.4 |
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7 http://www.debian.org/security/2016/dsa-3628 http://www.openwall.com/lists/oss-security/2016/07/07/1 http://www.openwall.com/lists/oss-security/2016/07/08/5 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91685 http://www.securitytracker.com/id/1036260 https://access.redhat.com/security/cve/CVE-2016-6185 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/ https://rt.cpan.org/Public/Bug/Display.html?id=115808 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
perl-base |
CVE-2017-6512 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.4 |
Expand...http://cpansearch.perl.org/src/JKEENAN/File-Path-2.13/Changes http://security.cucumberlinux.com/security/details.php?id=153 http://www.debian.org/security/2017/dsa-3873 http://www.securityfocus.com/bid/99180 http://www.securitytracker.com/id/1038610 https://access.redhat.com/security/cve/CVE-2017-6512 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512 https://rt.cpan.org/Ticket/Display.html?id=121951 https://security.gentoo.org/glsa/201709-12 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
perl-modules |
CVE-2016-2381 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.1 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076 http://www.debian.org/security/2016/dsa-3501 http://www.gossamer-threads.com/lists/perl/porters/326387 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/83802 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2016-2381 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-2916-1 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html
|
perl-modules |
CVE-2017-12837 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.3 |
Expand...http://www.debian.org/security/2017/dsa-3982 http://www.securityfocus.com/bid/100860 https://access.redhat.com/security/cve/CVE-2017-12837 https://bugzilla.redhat.com/show_bug.cgi?id=1492091 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837 https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5 https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1 https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1 https://rt.perl.org/Public/Bug/Display.html?id=131582 https://rt.perl.org/Public/Bug/Display.html?id=131582 (not yet public) https://security.netapp.com/advisory/ntap-20180426-0001/ https://ubuntu.com/security/notices/USN-3478-1 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl-modules |
CVE-2017-12883 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.3 |
Expand...http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch http://www.debian.org/security/2017/dsa-3982 http://www.securityfocus.com/bid/100852 https://access.redhat.com/security/cve/CVE-2017-12883 https://bugzilla.redhat.com/show_bug.cgi?id=1492093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883 https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1 https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1 https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1 https://rt.perl.org/Public/Bug/Display.html?id=131598 https://security.netapp.com/advisory/ntap-20180426-0001/ https://ubuntu.com/security/notices/USN-3478-1 https://ubuntu.com/security/notices/USN-3478-2 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl-modules |
CVE-2018-12015 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.6 |
Expand...http://seclists.org/fulldisclosure/2019/Mar/49 http://www.securityfocus.com/bid/104423 http://www.securitytracker.com/id/1041048 https://access.redhat.com/errata/RHSA-2019:2097 https://access.redhat.com/security/cve/CVE-2018-12015 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015 https://linux.oracle.com/cve/CVE-2018-12015.html https://linux.oracle.com/errata/ELSA-2019-2097.html https://seclists.org/bugtraq/2019/Mar/42 https://security.netapp.com/advisory/ntap-20180927-0001/ https://support.apple.com/kb/HT209600 https://ubuntu.com/security/notices/USN-3684-1 https://ubuntu.com/security/notices/USN-3684-2 https://usn.ubuntu.com/3684-1/ https://usn.ubuntu.com/3684-2/ https://www.debian.org/security/2018/dsa-4226 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl-modules |
CVE-2018-18311 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.7 |
Expand...http://seclists.org/fulldisclosure/2019/Mar/49 http://www.securityfocus.com/bid/106145 http://www.securitytracker.com/id/1042181 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2019:0001 https://access.redhat.com/errata/RHSA-2019:0010 https://access.redhat.com/errata/RHSA-2019:0109 https://access.redhat.com/errata/RHSA-2019:1790 https://access.redhat.com/errata/RHSA-2019:1942 https://access.redhat.com/errata/RHSA-2019:2400 https://access.redhat.com/security/cve/CVE-2018-18311 https://bugzilla.redhat.com/show_bug.cgi?id=1646730 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311 https://github.com/Perl/perl5/commit/34716e2a6ee2af96078d62b065b7785c001194be https://kc.mcafee.com/corporate/index?page=content&id=SB10278 https://linux.oracle.com/cve/CVE-2018-18311.html https://linux.oracle.com/errata/ELSA-2019-0109.html https://lists.debian.org/debian-lts-announce/2018/11/msg00039.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/ https://metacpan.org/changes/release/SHAY/perl-5.26.3 https://metacpan.org/changes/release/SHAY/perl-5.28.1 https://rt.perl.org/Ticket/Display.html?id=133204 https://seclists.org/bugtraq/2019/Mar/42 https://security.gentoo.org/glsa/201909-01 https://security.netapp.com/advisory/ntap-20190221-0003/ https://support.apple.com/kb/HT209600 https://ubuntu.com/security/notices/USN-3834-1 https://ubuntu.com/security/notices/USN-3834-2 https://usn.ubuntu.com/3834-1/ https://usn.ubuntu.com/3834-2/ https://www.debian.org/security/2018/dsa-4347 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
perl-modules |
CVE-2018-18313 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.7 |
Expand...http://seclists.org/fulldisclosure/2019/Mar/49 http://www.securitytracker.com/id/1042181 https://access.redhat.com/errata/RHSA-2019:0001 https://access.redhat.com/errata/RHSA-2019:0010 https://access.redhat.com/security/cve/CVE-2018-18313 https://bugzilla.redhat.com/show_bug.cgi?id=1646738 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313 https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/ https://metacpan.org/changes/release/SHAY/perl-5.26.3 https://rt.perl.org/Ticket/Display.html?id=133192 https://seclists.org/bugtraq/2019/Mar/42 https://security.gentoo.org/glsa/201909-01 https://security.netapp.com/advisory/ntap-20190221-0003/ https://support.apple.com/kb/HT209600 https://ubuntu.com/security/notices/USN-3834-1 https://ubuntu.com/security/notices/USN-3834-2 https://usn.ubuntu.com/3834-1/ https://usn.ubuntu.com/3834-2/ https://www.debian.org/security/2018/dsa-4347 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl-modules |
CVE-2018-6913 |
MEDIUM |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.4 |
Expand...http://www.securityfocus.com/bid/103953 http://www.securitytracker.com/id/1040681 https://access.redhat.com/security/cve/CVE-2018-6913 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913 https://lists.debian.org/debian-lts-announce/2018/04/msg00009.html https://rt.perl.org/Public/Bug/Display.html?id=131844 https://security.gentoo.org/glsa/201909-01 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/ https://www.debian.org/security/2018/dsa-4172 https://www.oracle.com/security-alerts/cpujul2020.html
|
perl-modules |
CVE-2013-7422 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.1 |
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06 http://www.securityfocus.com/bid/75704 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2013-7422 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422 https://security.gentoo.org/glsa/201507-11 https://support.apple.com/kb/HT205031 https://ubuntu.com/security/notices/USN-2916-1
|
perl-modules |
CVE-2014-4330 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.1 |
Expand...http://advisories.mageia.org/MGASA-2014-0406.html http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html http://seclists.org/fulldisclosure/2014/Sep/84 http://seclists.org/oss-sec/2014/q3/692 http://secunia.com/advisories/61441 http://secunia.com/advisories/61961 http://www.mandriva.com/security/advisories?name=MDVSA-2015:136 http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html http://www.securityfocus.com/archive/1/533543/100/0/threaded http://www.securityfocus.com/bid/70142 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2014-4330 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330 https://exchange.xforce.ibmcloud.com/vulnerabilities/96216 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://metacpan.org/pod/distribution/Data-Dumper/Changes https://ubuntu.com/security/notices/USN-2916-1 https://www.lsexperts.de/advisories/lse-2014-06-10.txt
|
perl-modules |
CVE-2015-8853 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.4 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5 http://www.openwall.com/lists/oss-security/2016/04/20/5 http://www.openwall.com/lists/oss-security/2016/04/20/7 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/86707 https://access.redhat.com/security/cve/CVE-2015-8853 https://bugzilla.redhat.com/show_bug.cgi?id=1329106 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://rt.perl.org/Public/Bug/Display.html?id=123562 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
perl-modules |
CVE-2016-6185 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.4 |
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7 http://www.debian.org/security/2016/dsa-3628 http://www.openwall.com/lists/oss-security/2016/07/07/1 http://www.openwall.com/lists/oss-security/2016/07/08/5 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91685 http://www.securitytracker.com/id/1036260 https://access.redhat.com/security/cve/CVE-2016-6185 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/ https://rt.cpan.org/Public/Bug/Display.html?id=115808 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
perl-modules |
CVE-2017-6512 |
LOW |
5.18.2-2ubuntu1 |
5.18.2-2ubuntu1.4 |
Expand...http://cpansearch.perl.org/src/JKEENAN/File-Path-2.13/Changes http://security.cucumberlinux.com/security/details.php?id=153 http://www.debian.org/security/2017/dsa-3873 http://www.securityfocus.com/bid/99180 http://www.securitytracker.com/id/1038610 https://access.redhat.com/security/cve/CVE-2017-6512 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512 https://rt.cpan.org/Ticket/Display.html?id=121951 https://security.gentoo.org/glsa/201709-12 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
php5-cli |
CVE-2015-8835 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.securityfocus.com/bid/84426 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8835 https://bugs.php.net/bug.php?id=70081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835 https://ubuntu.com/security/notices/USN-2952-1
|
php5-cli |
CVE-2015-8838 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=97aa752fee61fccdec361279adbfb17a3c60f3f4 http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8838 https://bugs.php.net/bug.php?id=69669 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8838 https://ubuntu.com/security/notices/USN-2952-1
|
php5-cli |
CVE-2015-8866 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://framework.zend.com/security/advisory/ZF2015-06 -> Relation to CVE-2015-5161 http://git.php.net/?p=php-src.git;a=commit;h=de31324c221c1791b26350ba106cc26bad23ace9 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/21/8 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/87470 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8866 https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817 https://bugs.php.net/bug.php?id=64938 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866 https://ubuntu.com/security/notices/USN-2952-1
|
php5-cli |
CVE-2015-8867 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/21/8 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8867 https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1534203 https://bugs.php.net/bug.php?id=70014 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8867 https://ubuntu.com/security/notices/USN-2952-1
|
php5-cli |
CVE-2015-8876 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.php.net/ChangeLog-5.php https://access.redhat.com/security/cve/CVE-2015-8876 https://bugs.php.net/bug.php?id=70121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8876 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2015-8935 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/06/20/3 https://access.redhat.com/security/cve/CVE-2015-8935 https://bugs.php.net/bug.php?id=68978 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8935 https://github.com/php/php-src/commit/996faf964bba1aec06b153b370a7f20d3dd2bb8b?w=1 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-10160 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95783 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10160 https://bugs.php.net/bug.php?id=73768 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160 https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-cli |
CVE-2016-10397 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99552 https://access.redhat.com/security/cve/CVE-2016-10397 https://bugs.php.net/bug.php?id=73192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10397 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-cli |
CVE-2016-2554 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/02/22/5 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-2554 https://bugs.php.net/bug.php?id=71488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-2952-1
|
php5-cli |
CVE-2016-3141 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b1bd4119bcafab6f9a8f84d92cd65eec3afeface http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/10/5 http://www.openwall.com/lists/oss-security/2016/03/13/1 http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html http://www.securityfocus.com/bid/84271 http://www.securitytracker.com/id/1035255 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3141 https://bugs.php.net/bug.php?id=71587 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141 https://php.net/ChangeLog-5.php https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1
|
php5-cli |
CVE-2016-3185 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://php.net/ChangeLog-7.php#7.0.4 http://www.securityfocus.com/bid/84307 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3185 https://bugs.php.net/bug.php?id=70081 https://bugs.php.net/bug.php?id=71610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3185 https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba https://secure.php.net/ChangeLog-5.php#5.6.12 https://ubuntu.com/security/notices/USN-2952-1
|
php5-cli |
CVE-2016-4070 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85801 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4070 https://bugs.php.net/bug.php?id=71798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070 https://git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
php5-cli |
CVE-2016-4071 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85800 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4071 https://bugs.php.net/bug.php?id=71704 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4071 https://git.php.net/?p=php-src.git;a=commit;h=6e25966544fb1d2f3d7596e060ce9c9269bbdcf8 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://www.exploit-db.com/exploits/39645/
|
php5-cli |
CVE-2016-4072 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85993 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4072 https://bugs.php.net/bug.php?id=71860 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4072 https://gist.github.com/smalyshev/80b5c2909832872f2ba2 https://git.php.net/?p=php-src.git;a=commit;h=1e9b175204e3286d64dfd6c9f09151c31b5e099a https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
php5-cli |
CVE-2016-4073 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85991 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4073 https://bugs.php.net/bug.php?id=71906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4073 https://gist.github.com/smalyshev/d8355c96a657cc5dba70 https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
php5-cli |
CVE-2016-4342 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/28/2 http://www.securityfocus.com/bid/89154 https://access.redhat.com/security/cve/CVE-2016-4342 https://bugs.php.net/bug.php?id=71354 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://ubuntu.com/security/notices/USN-2984-1
|
php5-cli |
CVE-2016-4343 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/28/2 http://www.securityfocus.com/bid/89179 https://access.redhat.com/security/cve/CVE-2016-4343 https://bugs.php.net/bug.php?id=71331 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4343 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://ubuntu.com/security/notices/USN-2984-1
|
php5-cli |
CVE-2016-4538 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90173 https://access.redhat.com/security/cve/CVE-2016-4538 https://bugs.php.net/bug.php?id=72093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538 https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-cli |
CVE-2016-4539 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90174 https://access.redhat.com/security/cve/CVE-2016-4539 https://bugs.php.net/bug.php?id=72099 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539 https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-cli |
CVE-2016-5385 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-7.php#7.0.9 http://rhn.redhat.com/errata/RHSA-2016-1609.html http://rhn.redhat.com/errata/RHSA-2016-1610.html http://rhn.redhat.com/errata/RHSA-2016-1611.html http://rhn.redhat.com/errata/RHSA-2016-1612.html http://rhn.redhat.com/errata/RHSA-2016-1613.html http://www.debian.org/security/2016/dsa-3631 http://www.kb.cert.org/vuls/id/797896 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91821 http://www.securitytracker.com/id/1036335 https://access.redhat.com/security/cve/CVE-2016-5385 https://bugzilla.redhat.com/show_bug.cgi?id=1353794 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385 https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml https://github.com/advisories/GHSA-m6ch-gg5f-wxx3 https://github.com/guzzle/guzzle/releases/tag/6.2.1 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://httpoxy.org/ https://linux.oracle.com/cve/CVE-2016-5385.html https://linux.oracle.com/errata/ELSA-2016-1613.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/ https://nvd.nist.gov/vuln/detail/CVE-2016-5385 https://security.gentoo.org/glsa/201611-22 https://typo3.org/security/advisory/typo3-core-sa-2016-019 https://ubuntu.com/security/notices/USN-3045-1 https://www.drupal.org/SA-CORE-2016-003
|
php5-cli |
CVE-2016-5399 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://php.net/ChangeLog-7.php#7.0.9 http://rhn.redhat.com/errata/RHSA-2016-2598.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://seclists.org/fulldisclosure/2016/Jul/72 http://www.debian.org/security/2016/dsa-3631 http://www.openwall.com/lists/oss-security/2016/07/21/1 http://www.securityfocus.com/archive/1/538966/100/0/threaded http://www.securityfocus.com/bid/92051 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-5399 https://bugs.php.net/bug.php?id=72613 https://bugzilla.redhat.com/show_bug.cgi?id=1358395 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399 https://linux.oracle.com/cve/CVE-2016-5399.html https://linux.oracle.com/errata/ELSA-2016-2598.html https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3045-1 https://www.exploit-db.com/exploits/40155/
|
php5-cli |
CVE-2016-5768 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/5b597a2e5b28e2d5a52fc1be13f425f08f47cb62?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2598.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91396 https://access.redhat.com/security/cve/CVE-2016-5768 https://bugs.php.net/bug.php?id=72402 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://linux.oracle.com/cve/CVE-2016-5768.html https://linux.oracle.com/errata/ELSA-2016-2598.html https://marc.info/?l=oss-security&m=146668499803695&w=2 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-5769 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91399 https://access.redhat.com/security/cve/CVE-2016-5769 https://bugs.php.net/bug.php?id=72455 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://marc.info/?l=oss-security&m=146668499803695&w=2 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-5772 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91398 https://access.redhat.com/security/cve/CVE-2016-5772 https://bugs.php.net/bug.php?id=72340 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-6288 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=629e4da7cc8b174acdeab84969cbfc606a019b31 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.securityfocus.com/bid/92111 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6288 https://bugs.php.net/70480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-6289 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92074 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6289 https://bugs.php.net/72513 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-6290 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=3798eb6fd5dddb211b01d41495072fd9858d4e32 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92097 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6290 https://bugs.php.net/72562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-6291 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=eebcbd5de38a0f1c2876035402cb770e37476519 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92073 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6291 https://bugs.php.net/72603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-6292 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=41131cd41d2fd2e0c2f332a27988df75659c42e4 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92078 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6292 https://bugs.php.net/72618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-6294 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92115 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6294 https://bugs.php.net/72533 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-6295 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=cab1c3b3708eead315e033359d07049b23b147a3 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92094 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6295 https://bugs.php.net/72479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-6296 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e6c48213c22ed50b2b987b479fcc1ac709394caa http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92095 http://www.securitytracker.com/id/1036430 http://www.ubuntu.com/usn/USN-3059-1 https://access.redhat.com/security/cve/CVE-2016-6296 https://bugs.php.net/72606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296 https://lists.debian.org/debian-lts-announce/2019/11/msg00029.html https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1 https://ubuntu.com/security/notices/USN-3059-1
|
php5-cli |
CVE-2016-6297 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92099 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6297 https://bugs.php.net/72520 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-7127 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92757 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7127 https://bugs.php.net/bug.php?id=72730 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127 https://github.com/php/php-src/commit/1bd103df00f49cf4d4ade2cfe3f456ac058a4eae?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-7129 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92758 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7129 https://bugs.php.net/bug.php?id=72749 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129 https://github.com/php/php-src/commit/426aeb2808955ee3d3f52e0cfb102834cdb836a5?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-7130 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92764 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7130 https://bugs.php.net/bug.php?id=72750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130 https://github.com/php/php-src/commit/698a691724c0a949295991e5df091ce16f899e02?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-7131 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92768 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7131 https://bugs.php.net/bug.php?id=72790 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131 https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-7132 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92767 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7132 https://bugs.php.net/bug.php?id=72799 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132 https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-7411 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/93009 http://www.securitytracker.com/id/1036836 https://access.redhat.com/security/cve/CVE-2016-7411 https://bugs.php.net/bug.php?id=73052 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411 https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1
|
php5-cli |
CVE-2016-7412 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93005 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7412 https://bugs.php.net/bug.php?id=72293 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412 https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-7413 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93006 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7413 https://bugs.php.net/bug.php?id=72860 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413 https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-7414 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93004 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7414 https://bugs.php.net/bug.php?id=72928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414 https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-7417 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93007 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7417 https://bugs.php.net/bug.php?id=73029 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417 https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-7478 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7 http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf http://www.securityfocus.com/bid/95150 https://access.redhat.com/security/cve/CVE-2016-7478 https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf https://bugs.php.net/bug.php?id=73093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://www.youtube.com/watch?v=LDcaPstAuPk
|
php5-cli |
CVE-2016-7479 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7 http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf http://www.securityfocus.com/bid/95151 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7479 https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf https://bugs.php.net/bug.php?id=73092 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.youtube.com/watch?v=LDcaPstAuPk
|
php5-cli |
CVE-2016-9934 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html http://www.openwall.com/lists/oss-security/2016/12/12/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/94845 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-9934 https://bugs.php.net/bug.php?id=73331 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934 https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d https://ubuntu.com/security/notices/USN-3196-1
|
php5-cli |
CVE-2016-9935 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html http://www.debian.org/security/2016/dsa-3737 http://www.openwall.com/lists/oss-security/2016/12/12/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/94846 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-9935 https://bugs.php.net/bug.php?id=73631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935 https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 https://security.gentoo.org/glsa/201702-29 https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1
|
php5-cli |
CVE-2017-11143 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://www.securityfocus.com/bid/99553 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11143 https://bugs.php.net/bug.php?id=74145 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143 https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
php5-cli |
CVE-2017-11144 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=73cabfedf519298e1a11192699f44d53c529315e http://git.php.net/?p=php-src.git;a=commit;h=89637c6b41b510c20d262c17483f582f115c66d6 http://git.php.net/?p=php-src.git;a=commit;h=91826a311dd37f4c4e5d605fa7af331e80ddd4c3 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11144 https://bugs.php.net/bug.php?id=74651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
php5-cli |
CVE-2017-11145 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e8b7698f5ee757ce2c8bd10a192a491a498f891c http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99550 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11145 https://bugs.php.net/bug.php?id=74819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145 https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
php5-cli |
CVE-2017-11147 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99607 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11147 https://bugs.php.net/bug.php?id=73773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11147 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.tenable.com/security/tns-2017-12
|
php5-cli |
CVE-2017-11628 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c http://www.securityfocus.com/bid/99489 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11628 https://bugs.php.net/bug.php?id=74603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628 https://security.gentoo.org/glsa/201709-21 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081
|
php5-cli |
CVE-2017-9224 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/101244 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9224 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224 https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b https://github.com/kkos/oniguruma/issues/57 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-cli |
CVE-2017-9226 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/101244 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226 https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6 https://github.com/kkos/oniguruma/issues/55 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-cli |
CVE-2017-9227 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/100538 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9227 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227 https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814 https://github.com/kkos/oniguruma/issues/58 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-cli |
CVE-2017-9228 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228 https://github.com/kkos/oniguruma/commit/3b63d12038c8d8fc278e81c942fa9bec7c704c8b https://github.com/kkos/oniguruma/issues/60 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-cli |
CVE-2017-9229 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9229 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229 https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d https://github.com/kkos/oniguruma/issues/59 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-cli |
CVE-2018-10545 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104022 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10545 https://bugs.php.net/bug.php?id=75605 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10545 https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
php5-cli |
CVE-2018-10546 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104019 http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10546 https://bugs.php.net/bug.php?id=76249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546 https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://usn.ubuntu.com/3646-1/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
php5-cli |
CVE-2018-10547 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10547 https://bugs.php.net/bug.php?id=76129 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547 https://linux.oracle.com/cve/CVE-2018-10547.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
php5-cli |
CVE-2018-10548 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104019 http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10548 https://bugs.php.net/bug.php?id=76248 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548 https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12 https://www.tenable.com/security/tns-2019-07
|
php5-cli |
CVE-2018-14883 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104871 https://access.redhat.com/security/cve/CVE-2018-14883 https://bugs.php.net/bug.php?id=76423 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883 https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-3766-1 https://ubuntu.com/security/notices/USN-3766-2 https://usn.ubuntu.com/3766-1/ https://usn.ubuntu.com/3766-2/ https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2018-12
|
php5-cli |
CVE-2018-17082 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-17082 https://bugs.php.net/bug.php?id=76582 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082 https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e https://lists.debian.org/debian-lts-announce/2018/09/msg00020.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180924-0001/ https://ubuntu.com/security/notices/USN-3766-1 https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2019-07
|
php5-cli |
CVE-2018-5712 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/102742 http://www.securityfocus.com/bid/104020 http://www.securitytracker.com/id/1040363 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-5712 https://bugs.php.net/bug.php?id=74782 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712 https://linux.oracle.com/cve/CVE-2018-5712.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html https://ubuntu.com/security/notices/USN-3566-1 https://ubuntu.com/security/notices/USN-3600-1 https://ubuntu.com/security/notices/USN-3600-2 https://usn.ubuntu.com/3566-1/ https://usn.ubuntu.com/3600-1/ https://usn.ubuntu.com/3600-2/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
php5-cli |
CVE-2018-7584 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.24 |
Expand...http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/103204 http://www.securitytracker.com/id/1041607 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-7584 https://bugs.php.net/bug.php?id=75981 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584 https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba https://linux.oracle.com/cve/CVE-2018-7584.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://ubuntu.com/security/notices/USN-3600-1 https://ubuntu.com/security/notices/USN-3600-2 https://usn.ubuntu.com/3600-1/ https://usn.ubuntu.com/3600-2/ https://www.debian.org/security/2018/dsa-4240 https://www.exploit-db.com/exploits/44846/ https://www.tenable.com/security/tns-2018-03 https://www.tenable.com/security/tns-2018-12
|
php5-cli |
CVE-2019-9020 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9020 https://bugs.php.net/bug.php?id=77242 https://bugs.php.net/bug.php?id=77249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020 https://linux.oracle.com/cve/CVE-2019-9020.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-cli |
CVE-2019-9021 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/106747 http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9021 https://bugs.php.net/bug.php?id=77247 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9021 https://linux.oracle.com/cve/CVE-2019-9021.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-cli |
CVE-2019-9022 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9022 https://bugs.php.net/bug.php?id=77369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9022 https://linux.oracle.com/cve/CVE-2019-9022.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4398 https://www.tenable.com/security/tns-2019-07
|
php5-cli |
CVE-2019-9023 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9023 https://bugs.php.net/bug.php?id=77370 https://bugs.php.net/bug.php?id=77371 https://bugs.php.net/bug.php?id=77381 https://bugs.php.net/bug.php?id=77382 https://bugs.php.net/bug.php?id=77385 https://bugs.php.net/bug.php?id=77394 https://bugs.php.net/bug.php?id=77418 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023 https://linux.oracle.com/cve/CVE-2019-9023.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://support.f5.com/csp/article/K06372014 https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-cli |
CVE-2019-9024 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9024 https://bugs.php.net/bug.php?id=77380 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024 https://linux.oracle.com/cve/CVE-2019-9024.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-cli |
CVE-2019-9638 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9638 https://bugs.php.net/bug.php?id=77563 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638 https://linux.oracle.com/cve/CVE-2019-9638.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-cli |
CVE-2019-9639 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9639 https://bugs.php.net/bug.php?id=77659 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639 https://linux.oracle.com/cve/CVE-2019-9639.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-cli |
CVE-2019-9640 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9640 https://bugs.php.net/bug.php?id=77540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640 https://linux.oracle.com/cve/CVE-2019-9640.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-cli |
CVE-2019-9641 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/security/cve/CVE-2019-9641 https://bugs.php.net/bug.php?id=77509 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641 https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-cli |
CVE-2014-9767 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/16/20 http://www.securityfocus.com/bid/76652 http://www.securitytracker.com/id/1035311 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2014-9767 https://bugs.php.net/bug.php?id=67996 https://bugs.php.net/bug.php?id=70350 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9767 https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686 https://ubuntu.com/security/notices/USN-2952-1
|
php5-cli |
CVE-2014-9912 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://www.openwall.com/lists/oss-security/2016/11/25/1 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/68549 https://access.redhat.com/security/cve/CVE-2014-9912 https://bugs.php.net/bug.php?id=67397 https://bugzilla.redhat.com/show_bug.cgi?id=1383569 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9912 https://marc.info/?l=oss-security&m=148003512008712&w=2 https://ubuntu.com/security/notices/USN-3196-1
|
php5-cli |
CVE-2015-4116 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=1cbd25ca15383394ffa9ee8601c5de4c0f2f90e1 http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php https://access.redhat.com/security/cve/CVE-2015-4116 https://bugs.php.net/bug.php?id=69737 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116 https://ubuntu.com/security/notices/USN-3045-1 https://www.htbridge.com/advisory/HTB23262
|
php5-cli |
CVE-2015-8865 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://bugs.gw.com/view.php?id=522 http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85802 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8865 https://bugs.php.net/bug.php?id=71527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865 https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://security.gentoo.org/glsa/201701-42 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://ubuntu.com/security/notices/USN-3686-1 https://ubuntu.com/security/notices/USN-3686-2 https://usn.ubuntu.com/3686-1/ https://usn.ubuntu.com/3686-2/
|
php5-cli |
CVE-2015-8873 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=4d2278143a08b7522de9471d0f014d7357c28fea http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html https://access.redhat.com/security/cve/CVE-2015-8873 https://bugs.php.net/bug.php?id=69793 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8873 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2015-8994 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://marc.info/?l=php-internals&m=147876797317925&w=2 http://marc.info/?l=php-internals&m=147921016724565&w=2 http://openwall.com/lists/oss-security/2017/02/28/1 http://seclists.org/oss-sec/2016/q4/343 http://seclists.org/oss-sec/2017/q1/520 https://access.redhat.com/security/cve/CVE-2015-8994 https://bugs.php.net/bug.php?id=69090 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8994 https://ma.ttias.be/a-better-way-to-run-php-fpm/ https://ubuntu.com/security/notices/USN-3382-1
|
php5-cli |
CVE-2016-10158 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95764 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10158 https://bugs.php.net/bug.php?id=73737 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158 https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-cli |
CVE-2016-10159 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95774 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10159 https://bugs.php.net/bug.php?id=73764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159 https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93 https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-cli |
CVE-2016-10161 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95768 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10161 https://bugs.php.net/bug.php?id=73825 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161 https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2 https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-cli |
CVE-2016-10712 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.24 |
Expand...https://access.redhat.com/security/cve/CVE-2016-10712 https://bugs.php.net/bug.php?id=71323 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10712 https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5 https://ubuntu.com/security/notices/USN-3566-2 https://ubuntu.com/security/notices/USN-3600-1 https://usn.ubuntu.com/3566-2/ https://usn.ubuntu.com/3600-1/
|
php5-cli |
CVE-2016-1903 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/01/14/8 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/79916 http://www.securitytracker.com/id/1034608 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-1903 https://bugs.php.net/bug.php?id=70976 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-2952-1
|
php5-cli |
CVE-2016-3142 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/10/5 http://www.openwall.com/lists/oss-security/2016/03/13/2 http://www.securitytracker.com/id/1035255 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3142 https://bugs.php.net/bug.php?id=71498 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142 https://git.php.net/?p=php-src.git;a=commit;h=a6fdc5bb27b20d889de0cd29318b3968aabb57bd https://php.net/ChangeLog-5.php https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1
|
php5-cli |
CVE-2016-4537 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90173 https://access.redhat.com/security/cve/CVE-2016-4537 https://bugs.php.net/bug.php?id=72093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537 https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-cli |
CVE-2016-4540 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90172 https://access.redhat.com/security/cve/CVE-2016-4540 https://bugs.php.net/bug.php?id=72061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540 https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-cli |
CVE-2016-4541 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90172 https://access.redhat.com/security/cve/CVE-2016-4541 https://bugs.php.net/bug.php?id=72061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541 https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-cli |
CVE-2016-4542 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4542 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-cli |
CVE-2016-4543 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4543 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-cli |
CVE-2016-4544 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4544 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-cli |
CVE-2016-5093 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90946 https://access.redhat.com/security/cve/CVE-2016-5093 https://bugs.php.net/bug.php?id=72241 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093 https://github.com/php/php-src/commit/97eff7eb57fc2320c267a949cffd622c38712484?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-5094 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90857 https://access.redhat.com/security/cve/CVE-2016-5094 https://bugs.php.net/bug.php?id=72135 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094 https://github.com/php/php-src/commit/0da8b8b801f9276359262f1ef8274c7812d3dfda?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-5095 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/92144 https://access.redhat.com/security/cve/CVE-2016-5095 https://bugs.php.net/bug.php?id=72135 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095 https://gist.github.com/8ef775c117d84ff15185953990a28576 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-5096 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90861 https://access.redhat.com/security/cve/CVE-2016-5096 https://bugs.php.net/bug.php?id=72114 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096 https://github.com/php/php-src/commit/abd159cce48f3e34f08e4751c568e09677d5ec9c?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-5114 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://seclists.org/bugtraq/2016/Jan/117 http://www.openwall.com/lists/oss-security/2016/02/02/4 http://www.openwall.com/lists/oss-security/2016/05/29/1 http://www.search-lab.hu/about-us/news/111-some-unusual-vulnerabilities-in-the-php-engine https://access.redhat.com/security/cve/CVE-2016-5114 https://bugs.php.net/bug.php?id=70755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-5771 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91401 https://access.redhat.com/security/cve/CVE-2016-5771 https://bugs.php.net/bug.php?id=72433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-cli |
CVE-2016-5773 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91397 https://access.redhat.com/security/cve/CVE-2016-5773 https://bugs.php.net/bug.php?id=72434 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1 https://www.evonide.com/breaking-phps-garbage-collection-and-unserialize/
|
php5-cli |
CVE-2016-7124 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92756 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7124 https://bugs.php.net/bug.php?id=72663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124 https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-7125 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92552 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7125 https://bugs.php.net/bug.php?id=72681 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125 https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-7128 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92564 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7128 https://bugs.php.net/bug.php?id=72627 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128 https://github.com/php/php-src/commit/6dbb1ee46b5f4725cc6519abf91e512a2a10dfed?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-7416 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93008 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7416 https://bugs.php.net/bug.php?id=73007 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416 https://github.com/php/php-src/commit/6d55ba265637d6adf0ba7e9c9ef11187d1ec2f5b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-7418 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93011 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7418 https://bugs.php.net/bug.php?id=73065 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418 https://github.com/php/php-src/commit/c4cca4c20e75359c9a13a1f9a36cb7b4e9601d29?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2016-9137 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f http://www.debian.org/security/2016/dsa-3698 http://www.openwall.com/lists/oss-security/2016/10/18/1 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93577 https://access.redhat.com/security/cve/CVE-2016-9137 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137 https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2016-19
|
php5-cli |
CVE-2017-11362 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11362 https://bugs.php.net/bug.php?id=73473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11362 https://security.gentoo.org/glsa/201709-21 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3566-2 https://usn.ubuntu.com/3566-2/
|
php5-cli |
CVE-2017-12933 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99490 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-12933 https://bugs.php.net/bug.php?id=74111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933 https://ubuntu.com/security/notices/USN-3566-1 https://ubuntu.com/security/notices/USN-3566-2 https://usn.ubuntu.com/3566-1/ https://usn.ubuntu.com/3566-2/ https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081
|
php5-cli |
CVE-2017-16642 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/101745 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2017-16642 https://bugs.php.net/bug.php?id=75055 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642 https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536 https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1 https://security.netapp.com/advisory/ntap-20181123-0001/ https://ubuntu.com/security/notices/USN-3566-1 https://usn.ubuntu.com/3566-1/ https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.exploit-db.com/exploits/43133/
|
php5-cli |
CVE-2018-14851 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104871 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-14851 https://bugs.php.net/bug.php?id=76557 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851 https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-3766-1 https://ubuntu.com/security/notices/USN-3766-2 https://usn.ubuntu.com/3766-1/ https://usn.ubuntu.com/3766-2/ https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2018-12
|
php5-cli |
CVE-2019-9637 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9637 https://bugs.php.net/bug.php?id=77630 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637 https://linux.oracle.com/cve/CVE-2019-9637.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://support.f5.com/csp/article/K53825211 https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403 https://www.tenable.com/security/tns-2019-07
|
php5-cli |
CVE-2019-9675 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://php.net/ChangeLog-7.php https://access.redhat.com/security/cve/CVE-2019-9675 https://bugs.php.net/bug.php?id=77586 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675 https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/
|
php5-common |
CVE-2015-8835 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.securityfocus.com/bid/84426 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8835 https://bugs.php.net/bug.php?id=70081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835 https://ubuntu.com/security/notices/USN-2952-1
|
php5-common |
CVE-2015-8838 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=97aa752fee61fccdec361279adbfb17a3c60f3f4 http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8838 https://bugs.php.net/bug.php?id=69669 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8838 https://ubuntu.com/security/notices/USN-2952-1
|
php5-common |
CVE-2015-8866 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://framework.zend.com/security/advisory/ZF2015-06 -> Relation to CVE-2015-5161 http://git.php.net/?p=php-src.git;a=commit;h=de31324c221c1791b26350ba106cc26bad23ace9 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/21/8 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/87470 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8866 https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817 https://bugs.php.net/bug.php?id=64938 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866 https://ubuntu.com/security/notices/USN-2952-1
|
php5-common |
CVE-2015-8867 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/21/8 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8867 https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1534203 https://bugs.php.net/bug.php?id=70014 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8867 https://ubuntu.com/security/notices/USN-2952-1
|
php5-common |
CVE-2015-8876 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.php.net/ChangeLog-5.php https://access.redhat.com/security/cve/CVE-2015-8876 https://bugs.php.net/bug.php?id=70121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8876 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2015-8935 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/06/20/3 https://access.redhat.com/security/cve/CVE-2015-8935 https://bugs.php.net/bug.php?id=68978 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8935 https://github.com/php/php-src/commit/996faf964bba1aec06b153b370a7f20d3dd2bb8b?w=1 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-10160 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95783 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10160 https://bugs.php.net/bug.php?id=73768 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160 https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-common |
CVE-2016-10397 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99552 https://access.redhat.com/security/cve/CVE-2016-10397 https://bugs.php.net/bug.php?id=73192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10397 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-common |
CVE-2016-2554 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/02/22/5 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-2554 https://bugs.php.net/bug.php?id=71488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-2952-1
|
php5-common |
CVE-2016-3141 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b1bd4119bcafab6f9a8f84d92cd65eec3afeface http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/10/5 http://www.openwall.com/lists/oss-security/2016/03/13/1 http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html http://www.securityfocus.com/bid/84271 http://www.securitytracker.com/id/1035255 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3141 https://bugs.php.net/bug.php?id=71587 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141 https://php.net/ChangeLog-5.php https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1
|
php5-common |
CVE-2016-3185 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://php.net/ChangeLog-7.php#7.0.4 http://www.securityfocus.com/bid/84307 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3185 https://bugs.php.net/bug.php?id=70081 https://bugs.php.net/bug.php?id=71610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3185 https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba https://secure.php.net/ChangeLog-5.php#5.6.12 https://ubuntu.com/security/notices/USN-2952-1
|
php5-common |
CVE-2016-4070 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85801 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4070 https://bugs.php.net/bug.php?id=71798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070 https://git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
php5-common |
CVE-2016-4071 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85800 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4071 https://bugs.php.net/bug.php?id=71704 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4071 https://git.php.net/?p=php-src.git;a=commit;h=6e25966544fb1d2f3d7596e060ce9c9269bbdcf8 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://www.exploit-db.com/exploits/39645/
|
php5-common |
CVE-2016-4072 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85993 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4072 https://bugs.php.net/bug.php?id=71860 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4072 https://gist.github.com/smalyshev/80b5c2909832872f2ba2 https://git.php.net/?p=php-src.git;a=commit;h=1e9b175204e3286d64dfd6c9f09151c31b5e099a https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
php5-common |
CVE-2016-4073 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85991 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4073 https://bugs.php.net/bug.php?id=71906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4073 https://gist.github.com/smalyshev/d8355c96a657cc5dba70 https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
php5-common |
CVE-2016-4342 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/28/2 http://www.securityfocus.com/bid/89154 https://access.redhat.com/security/cve/CVE-2016-4342 https://bugs.php.net/bug.php?id=71354 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://ubuntu.com/security/notices/USN-2984-1
|
php5-common |
CVE-2016-4343 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/28/2 http://www.securityfocus.com/bid/89179 https://access.redhat.com/security/cve/CVE-2016-4343 https://bugs.php.net/bug.php?id=71331 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4343 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://ubuntu.com/security/notices/USN-2984-1
|
php5-common |
CVE-2016-4538 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90173 https://access.redhat.com/security/cve/CVE-2016-4538 https://bugs.php.net/bug.php?id=72093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538 https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-common |
CVE-2016-4539 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90174 https://access.redhat.com/security/cve/CVE-2016-4539 https://bugs.php.net/bug.php?id=72099 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539 https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-common |
CVE-2016-5385 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-7.php#7.0.9 http://rhn.redhat.com/errata/RHSA-2016-1609.html http://rhn.redhat.com/errata/RHSA-2016-1610.html http://rhn.redhat.com/errata/RHSA-2016-1611.html http://rhn.redhat.com/errata/RHSA-2016-1612.html http://rhn.redhat.com/errata/RHSA-2016-1613.html http://www.debian.org/security/2016/dsa-3631 http://www.kb.cert.org/vuls/id/797896 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91821 http://www.securitytracker.com/id/1036335 https://access.redhat.com/security/cve/CVE-2016-5385 https://bugzilla.redhat.com/show_bug.cgi?id=1353794 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385 https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml https://github.com/advisories/GHSA-m6ch-gg5f-wxx3 https://github.com/guzzle/guzzle/releases/tag/6.2.1 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://httpoxy.org/ https://linux.oracle.com/cve/CVE-2016-5385.html https://linux.oracle.com/errata/ELSA-2016-1613.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/ https://nvd.nist.gov/vuln/detail/CVE-2016-5385 https://security.gentoo.org/glsa/201611-22 https://typo3.org/security/advisory/typo3-core-sa-2016-019 https://ubuntu.com/security/notices/USN-3045-1 https://www.drupal.org/SA-CORE-2016-003
|
php5-common |
CVE-2016-5399 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://php.net/ChangeLog-7.php#7.0.9 http://rhn.redhat.com/errata/RHSA-2016-2598.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://seclists.org/fulldisclosure/2016/Jul/72 http://www.debian.org/security/2016/dsa-3631 http://www.openwall.com/lists/oss-security/2016/07/21/1 http://www.securityfocus.com/archive/1/538966/100/0/threaded http://www.securityfocus.com/bid/92051 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-5399 https://bugs.php.net/bug.php?id=72613 https://bugzilla.redhat.com/show_bug.cgi?id=1358395 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399 https://linux.oracle.com/cve/CVE-2016-5399.html https://linux.oracle.com/errata/ELSA-2016-2598.html https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3045-1 https://www.exploit-db.com/exploits/40155/
|
php5-common |
CVE-2016-5768 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/5b597a2e5b28e2d5a52fc1be13f425f08f47cb62?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2598.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91396 https://access.redhat.com/security/cve/CVE-2016-5768 https://bugs.php.net/bug.php?id=72402 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://linux.oracle.com/cve/CVE-2016-5768.html https://linux.oracle.com/errata/ELSA-2016-2598.html https://marc.info/?l=oss-security&m=146668499803695&w=2 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-5769 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91399 https://access.redhat.com/security/cve/CVE-2016-5769 https://bugs.php.net/bug.php?id=72455 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://marc.info/?l=oss-security&m=146668499803695&w=2 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-5772 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91398 https://access.redhat.com/security/cve/CVE-2016-5772 https://bugs.php.net/bug.php?id=72340 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-6288 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=629e4da7cc8b174acdeab84969cbfc606a019b31 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.securityfocus.com/bid/92111 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6288 https://bugs.php.net/70480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-6289 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92074 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6289 https://bugs.php.net/72513 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-6290 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=3798eb6fd5dddb211b01d41495072fd9858d4e32 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92097 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6290 https://bugs.php.net/72562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-6291 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=eebcbd5de38a0f1c2876035402cb770e37476519 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92073 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6291 https://bugs.php.net/72603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-6292 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=41131cd41d2fd2e0c2f332a27988df75659c42e4 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92078 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6292 https://bugs.php.net/72618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-6294 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92115 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6294 https://bugs.php.net/72533 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-6295 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=cab1c3b3708eead315e033359d07049b23b147a3 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92094 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6295 https://bugs.php.net/72479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-6296 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e6c48213c22ed50b2b987b479fcc1ac709394caa http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92095 http://www.securitytracker.com/id/1036430 http://www.ubuntu.com/usn/USN-3059-1 https://access.redhat.com/security/cve/CVE-2016-6296 https://bugs.php.net/72606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296 https://lists.debian.org/debian-lts-announce/2019/11/msg00029.html https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1 https://ubuntu.com/security/notices/USN-3059-1
|
php5-common |
CVE-2016-6297 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92099 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6297 https://bugs.php.net/72520 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-7127 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92757 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7127 https://bugs.php.net/bug.php?id=72730 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127 https://github.com/php/php-src/commit/1bd103df00f49cf4d4ade2cfe3f456ac058a4eae?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-7129 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92758 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7129 https://bugs.php.net/bug.php?id=72749 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129 https://github.com/php/php-src/commit/426aeb2808955ee3d3f52e0cfb102834cdb836a5?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-7130 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92764 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7130 https://bugs.php.net/bug.php?id=72750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130 https://github.com/php/php-src/commit/698a691724c0a949295991e5df091ce16f899e02?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-7131 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92768 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7131 https://bugs.php.net/bug.php?id=72790 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131 https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-7132 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92767 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7132 https://bugs.php.net/bug.php?id=72799 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132 https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-7411 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/93009 http://www.securitytracker.com/id/1036836 https://access.redhat.com/security/cve/CVE-2016-7411 https://bugs.php.net/bug.php?id=73052 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411 https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1
|
php5-common |
CVE-2016-7412 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93005 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7412 https://bugs.php.net/bug.php?id=72293 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412 https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-7413 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93006 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7413 https://bugs.php.net/bug.php?id=72860 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413 https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-7414 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93004 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7414 https://bugs.php.net/bug.php?id=72928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414 https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-7417 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93007 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7417 https://bugs.php.net/bug.php?id=73029 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417 https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-7478 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7 http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf http://www.securityfocus.com/bid/95150 https://access.redhat.com/security/cve/CVE-2016-7478 https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf https://bugs.php.net/bug.php?id=73093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://www.youtube.com/watch?v=LDcaPstAuPk
|
php5-common |
CVE-2016-7479 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7 http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf http://www.securityfocus.com/bid/95151 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7479 https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf https://bugs.php.net/bug.php?id=73092 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.youtube.com/watch?v=LDcaPstAuPk
|
php5-common |
CVE-2016-9934 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html http://www.openwall.com/lists/oss-security/2016/12/12/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/94845 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-9934 https://bugs.php.net/bug.php?id=73331 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934 https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d https://ubuntu.com/security/notices/USN-3196-1
|
php5-common |
CVE-2016-9935 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html http://www.debian.org/security/2016/dsa-3737 http://www.openwall.com/lists/oss-security/2016/12/12/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/94846 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-9935 https://bugs.php.net/bug.php?id=73631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935 https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 https://security.gentoo.org/glsa/201702-29 https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1
|
php5-common |
CVE-2017-11143 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://www.securityfocus.com/bid/99553 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11143 https://bugs.php.net/bug.php?id=74145 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143 https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
php5-common |
CVE-2017-11144 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=73cabfedf519298e1a11192699f44d53c529315e http://git.php.net/?p=php-src.git;a=commit;h=89637c6b41b510c20d262c17483f582f115c66d6 http://git.php.net/?p=php-src.git;a=commit;h=91826a311dd37f4c4e5d605fa7af331e80ddd4c3 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11144 https://bugs.php.net/bug.php?id=74651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
php5-common |
CVE-2017-11145 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e8b7698f5ee757ce2c8bd10a192a491a498f891c http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99550 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11145 https://bugs.php.net/bug.php?id=74819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145 https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
php5-common |
CVE-2017-11147 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99607 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11147 https://bugs.php.net/bug.php?id=73773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11147 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.tenable.com/security/tns-2017-12
|
php5-common |
CVE-2017-11628 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c http://www.securityfocus.com/bid/99489 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11628 https://bugs.php.net/bug.php?id=74603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628 https://security.gentoo.org/glsa/201709-21 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081
|
php5-common |
CVE-2017-9224 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/101244 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9224 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224 https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b https://github.com/kkos/oniguruma/issues/57 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-common |
CVE-2017-9226 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/101244 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226 https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6 https://github.com/kkos/oniguruma/issues/55 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-common |
CVE-2017-9227 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/100538 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9227 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227 https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814 https://github.com/kkos/oniguruma/issues/58 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-common |
CVE-2017-9228 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228 https://github.com/kkos/oniguruma/commit/3b63d12038c8d8fc278e81c942fa9bec7c704c8b https://github.com/kkos/oniguruma/issues/60 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-common |
CVE-2017-9229 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9229 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229 https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d https://github.com/kkos/oniguruma/issues/59 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-common |
CVE-2018-10545 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104022 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10545 https://bugs.php.net/bug.php?id=75605 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10545 https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
php5-common |
CVE-2018-10546 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104019 http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10546 https://bugs.php.net/bug.php?id=76249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546 https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://usn.ubuntu.com/3646-1/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
php5-common |
CVE-2018-10547 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10547 https://bugs.php.net/bug.php?id=76129 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547 https://linux.oracle.com/cve/CVE-2018-10547.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
php5-common |
CVE-2018-10548 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104019 http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10548 https://bugs.php.net/bug.php?id=76248 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548 https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12 https://www.tenable.com/security/tns-2019-07
|
php5-common |
CVE-2018-14883 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104871 https://access.redhat.com/security/cve/CVE-2018-14883 https://bugs.php.net/bug.php?id=76423 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883 https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-3766-1 https://ubuntu.com/security/notices/USN-3766-2 https://usn.ubuntu.com/3766-1/ https://usn.ubuntu.com/3766-2/ https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2018-12
|
php5-common |
CVE-2018-17082 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-17082 https://bugs.php.net/bug.php?id=76582 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082 https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e https://lists.debian.org/debian-lts-announce/2018/09/msg00020.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180924-0001/ https://ubuntu.com/security/notices/USN-3766-1 https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2019-07
|
php5-common |
CVE-2018-5712 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/102742 http://www.securityfocus.com/bid/104020 http://www.securitytracker.com/id/1040363 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-5712 https://bugs.php.net/bug.php?id=74782 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712 https://linux.oracle.com/cve/CVE-2018-5712.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html https://ubuntu.com/security/notices/USN-3566-1 https://ubuntu.com/security/notices/USN-3600-1 https://ubuntu.com/security/notices/USN-3600-2 https://usn.ubuntu.com/3566-1/ https://usn.ubuntu.com/3600-1/ https://usn.ubuntu.com/3600-2/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
php5-common |
CVE-2018-7584 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.24 |
Expand...http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/103204 http://www.securitytracker.com/id/1041607 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-7584 https://bugs.php.net/bug.php?id=75981 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584 https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba https://linux.oracle.com/cve/CVE-2018-7584.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://ubuntu.com/security/notices/USN-3600-1 https://ubuntu.com/security/notices/USN-3600-2 https://usn.ubuntu.com/3600-1/ https://usn.ubuntu.com/3600-2/ https://www.debian.org/security/2018/dsa-4240 https://www.exploit-db.com/exploits/44846/ https://www.tenable.com/security/tns-2018-03 https://www.tenable.com/security/tns-2018-12
|
php5-common |
CVE-2019-9020 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9020 https://bugs.php.net/bug.php?id=77242 https://bugs.php.net/bug.php?id=77249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020 https://linux.oracle.com/cve/CVE-2019-9020.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-common |
CVE-2019-9021 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/106747 http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9021 https://bugs.php.net/bug.php?id=77247 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9021 https://linux.oracle.com/cve/CVE-2019-9021.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-common |
CVE-2019-9022 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9022 https://bugs.php.net/bug.php?id=77369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9022 https://linux.oracle.com/cve/CVE-2019-9022.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4398 https://www.tenable.com/security/tns-2019-07
|
php5-common |
CVE-2019-9023 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9023 https://bugs.php.net/bug.php?id=77370 https://bugs.php.net/bug.php?id=77371 https://bugs.php.net/bug.php?id=77381 https://bugs.php.net/bug.php?id=77382 https://bugs.php.net/bug.php?id=77385 https://bugs.php.net/bug.php?id=77394 https://bugs.php.net/bug.php?id=77418 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023 https://linux.oracle.com/cve/CVE-2019-9023.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://support.f5.com/csp/article/K06372014 https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-common |
CVE-2019-9024 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9024 https://bugs.php.net/bug.php?id=77380 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024 https://linux.oracle.com/cve/CVE-2019-9024.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-common |
CVE-2019-9638 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9638 https://bugs.php.net/bug.php?id=77563 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638 https://linux.oracle.com/cve/CVE-2019-9638.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-common |
CVE-2019-9639 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9639 https://bugs.php.net/bug.php?id=77659 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639 https://linux.oracle.com/cve/CVE-2019-9639.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-common |
CVE-2019-9640 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9640 https://bugs.php.net/bug.php?id=77540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640 https://linux.oracle.com/cve/CVE-2019-9640.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-common |
CVE-2019-9641 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/security/cve/CVE-2019-9641 https://bugs.php.net/bug.php?id=77509 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641 https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-common |
CVE-2014-9767 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/16/20 http://www.securityfocus.com/bid/76652 http://www.securitytracker.com/id/1035311 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2014-9767 https://bugs.php.net/bug.php?id=67996 https://bugs.php.net/bug.php?id=70350 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9767 https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686 https://ubuntu.com/security/notices/USN-2952-1
|
php5-common |
CVE-2014-9912 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://www.openwall.com/lists/oss-security/2016/11/25/1 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/68549 https://access.redhat.com/security/cve/CVE-2014-9912 https://bugs.php.net/bug.php?id=67397 https://bugzilla.redhat.com/show_bug.cgi?id=1383569 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9912 https://marc.info/?l=oss-security&m=148003512008712&w=2 https://ubuntu.com/security/notices/USN-3196-1
|
php5-common |
CVE-2015-4116 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=1cbd25ca15383394ffa9ee8601c5de4c0f2f90e1 http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php https://access.redhat.com/security/cve/CVE-2015-4116 https://bugs.php.net/bug.php?id=69737 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116 https://ubuntu.com/security/notices/USN-3045-1 https://www.htbridge.com/advisory/HTB23262
|
php5-common |
CVE-2015-8865 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://bugs.gw.com/view.php?id=522 http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85802 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8865 https://bugs.php.net/bug.php?id=71527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865 https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://security.gentoo.org/glsa/201701-42 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://ubuntu.com/security/notices/USN-3686-1 https://ubuntu.com/security/notices/USN-3686-2 https://usn.ubuntu.com/3686-1/ https://usn.ubuntu.com/3686-2/
|
php5-common |
CVE-2015-8873 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=4d2278143a08b7522de9471d0f014d7357c28fea http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html https://access.redhat.com/security/cve/CVE-2015-8873 https://bugs.php.net/bug.php?id=69793 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8873 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2015-8994 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://marc.info/?l=php-internals&m=147876797317925&w=2 http://marc.info/?l=php-internals&m=147921016724565&w=2 http://openwall.com/lists/oss-security/2017/02/28/1 http://seclists.org/oss-sec/2016/q4/343 http://seclists.org/oss-sec/2017/q1/520 https://access.redhat.com/security/cve/CVE-2015-8994 https://bugs.php.net/bug.php?id=69090 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8994 https://ma.ttias.be/a-better-way-to-run-php-fpm/ https://ubuntu.com/security/notices/USN-3382-1
|
php5-common |
CVE-2016-10158 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95764 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10158 https://bugs.php.net/bug.php?id=73737 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158 https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-common |
CVE-2016-10159 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95774 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10159 https://bugs.php.net/bug.php?id=73764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159 https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93 https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-common |
CVE-2016-10161 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95768 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10161 https://bugs.php.net/bug.php?id=73825 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161 https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2 https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-common |
CVE-2016-10712 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.24 |
Expand...https://access.redhat.com/security/cve/CVE-2016-10712 https://bugs.php.net/bug.php?id=71323 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10712 https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5 https://ubuntu.com/security/notices/USN-3566-2 https://ubuntu.com/security/notices/USN-3600-1 https://usn.ubuntu.com/3566-2/ https://usn.ubuntu.com/3600-1/
|
php5-common |
CVE-2016-1903 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/01/14/8 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/79916 http://www.securitytracker.com/id/1034608 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-1903 https://bugs.php.net/bug.php?id=70976 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-2952-1
|
php5-common |
CVE-2016-3142 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/10/5 http://www.openwall.com/lists/oss-security/2016/03/13/2 http://www.securitytracker.com/id/1035255 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3142 https://bugs.php.net/bug.php?id=71498 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142 https://git.php.net/?p=php-src.git;a=commit;h=a6fdc5bb27b20d889de0cd29318b3968aabb57bd https://php.net/ChangeLog-5.php https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1
|
php5-common |
CVE-2016-4537 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90173 https://access.redhat.com/security/cve/CVE-2016-4537 https://bugs.php.net/bug.php?id=72093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537 https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-common |
CVE-2016-4540 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90172 https://access.redhat.com/security/cve/CVE-2016-4540 https://bugs.php.net/bug.php?id=72061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540 https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-common |
CVE-2016-4541 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90172 https://access.redhat.com/security/cve/CVE-2016-4541 https://bugs.php.net/bug.php?id=72061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541 https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-common |
CVE-2016-4542 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4542 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-common |
CVE-2016-4543 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4543 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-common |
CVE-2016-4544 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4544 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-common |
CVE-2016-5093 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90946 https://access.redhat.com/security/cve/CVE-2016-5093 https://bugs.php.net/bug.php?id=72241 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093 https://github.com/php/php-src/commit/97eff7eb57fc2320c267a949cffd622c38712484?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-5094 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90857 https://access.redhat.com/security/cve/CVE-2016-5094 https://bugs.php.net/bug.php?id=72135 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094 https://github.com/php/php-src/commit/0da8b8b801f9276359262f1ef8274c7812d3dfda?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-5095 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/92144 https://access.redhat.com/security/cve/CVE-2016-5095 https://bugs.php.net/bug.php?id=72135 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095 https://gist.github.com/8ef775c117d84ff15185953990a28576 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-5096 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90861 https://access.redhat.com/security/cve/CVE-2016-5096 https://bugs.php.net/bug.php?id=72114 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096 https://github.com/php/php-src/commit/abd159cce48f3e34f08e4751c568e09677d5ec9c?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-5114 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://seclists.org/bugtraq/2016/Jan/117 http://www.openwall.com/lists/oss-security/2016/02/02/4 http://www.openwall.com/lists/oss-security/2016/05/29/1 http://www.search-lab.hu/about-us/news/111-some-unusual-vulnerabilities-in-the-php-engine https://access.redhat.com/security/cve/CVE-2016-5114 https://bugs.php.net/bug.php?id=70755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-5771 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91401 https://access.redhat.com/security/cve/CVE-2016-5771 https://bugs.php.net/bug.php?id=72433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-common |
CVE-2016-5773 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91397 https://access.redhat.com/security/cve/CVE-2016-5773 https://bugs.php.net/bug.php?id=72434 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1 https://www.evonide.com/breaking-phps-garbage-collection-and-unserialize/
|
php5-common |
CVE-2016-7124 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92756 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7124 https://bugs.php.net/bug.php?id=72663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124 https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-7125 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92552 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7125 https://bugs.php.net/bug.php?id=72681 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125 https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-7128 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92564 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7128 https://bugs.php.net/bug.php?id=72627 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128 https://github.com/php/php-src/commit/6dbb1ee46b5f4725cc6519abf91e512a2a10dfed?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-7416 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93008 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7416 https://bugs.php.net/bug.php?id=73007 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416 https://github.com/php/php-src/commit/6d55ba265637d6adf0ba7e9c9ef11187d1ec2f5b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-7418 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93011 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7418 https://bugs.php.net/bug.php?id=73065 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418 https://github.com/php/php-src/commit/c4cca4c20e75359c9a13a1f9a36cb7b4e9601d29?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2016-9137 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f http://www.debian.org/security/2016/dsa-3698 http://www.openwall.com/lists/oss-security/2016/10/18/1 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93577 https://access.redhat.com/security/cve/CVE-2016-9137 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137 https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2016-19
|
php5-common |
CVE-2017-11362 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11362 https://bugs.php.net/bug.php?id=73473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11362 https://security.gentoo.org/glsa/201709-21 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3566-2 https://usn.ubuntu.com/3566-2/
|
php5-common |
CVE-2017-12933 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99490 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-12933 https://bugs.php.net/bug.php?id=74111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933 https://ubuntu.com/security/notices/USN-3566-1 https://ubuntu.com/security/notices/USN-3566-2 https://usn.ubuntu.com/3566-1/ https://usn.ubuntu.com/3566-2/ https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081
|
php5-common |
CVE-2017-16642 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/101745 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2017-16642 https://bugs.php.net/bug.php?id=75055 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642 https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536 https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1 https://security.netapp.com/advisory/ntap-20181123-0001/ https://ubuntu.com/security/notices/USN-3566-1 https://usn.ubuntu.com/3566-1/ https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.exploit-db.com/exploits/43133/
|
php5-common |
CVE-2018-14851 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104871 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-14851 https://bugs.php.net/bug.php?id=76557 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851 https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-3766-1 https://ubuntu.com/security/notices/USN-3766-2 https://usn.ubuntu.com/3766-1/ https://usn.ubuntu.com/3766-2/ https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2018-12
|
php5-common |
CVE-2019-9637 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9637 https://bugs.php.net/bug.php?id=77630 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637 https://linux.oracle.com/cve/CVE-2019-9637.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://support.f5.com/csp/article/K53825211 https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403 https://www.tenable.com/security/tns-2019-07
|
php5-common |
CVE-2019-9675 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://php.net/ChangeLog-7.php https://access.redhat.com/security/cve/CVE-2019-9675 https://bugs.php.net/bug.php?id=77586 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675 https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/
|
php5-mysql |
CVE-2015-8835 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.securityfocus.com/bid/84426 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8835 https://bugs.php.net/bug.php?id=70081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835 https://ubuntu.com/security/notices/USN-2952-1
|
php5-mysql |
CVE-2015-8838 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=97aa752fee61fccdec361279adbfb17a3c60f3f4 http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8838 https://bugs.php.net/bug.php?id=69669 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8838 https://ubuntu.com/security/notices/USN-2952-1
|
php5-mysql |
CVE-2015-8866 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://framework.zend.com/security/advisory/ZF2015-06 -> Relation to CVE-2015-5161 http://git.php.net/?p=php-src.git;a=commit;h=de31324c221c1791b26350ba106cc26bad23ace9 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/21/8 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/87470 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8866 https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817 https://bugs.php.net/bug.php?id=64938 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866 https://ubuntu.com/security/notices/USN-2952-1
|
php5-mysql |
CVE-2015-8867 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/21/8 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8867 https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1534203 https://bugs.php.net/bug.php?id=70014 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8867 https://ubuntu.com/security/notices/USN-2952-1
|
php5-mysql |
CVE-2015-8876 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.php.net/ChangeLog-5.php https://access.redhat.com/security/cve/CVE-2015-8876 https://bugs.php.net/bug.php?id=70121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8876 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2015-8935 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/06/20/3 https://access.redhat.com/security/cve/CVE-2015-8935 https://bugs.php.net/bug.php?id=68978 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8935 https://github.com/php/php-src/commit/996faf964bba1aec06b153b370a7f20d3dd2bb8b?w=1 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-10160 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95783 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10160 https://bugs.php.net/bug.php?id=73768 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160 https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-mysql |
CVE-2016-10397 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99552 https://access.redhat.com/security/cve/CVE-2016-10397 https://bugs.php.net/bug.php?id=73192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10397 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-mysql |
CVE-2016-2554 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/02/22/5 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-2554 https://bugs.php.net/bug.php?id=71488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-2952-1
|
php5-mysql |
CVE-2016-3141 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b1bd4119bcafab6f9a8f84d92cd65eec3afeface http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/10/5 http://www.openwall.com/lists/oss-security/2016/03/13/1 http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html http://www.securityfocus.com/bid/84271 http://www.securitytracker.com/id/1035255 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3141 https://bugs.php.net/bug.php?id=71587 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141 https://php.net/ChangeLog-5.php https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1
|
php5-mysql |
CVE-2016-3185 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://php.net/ChangeLog-7.php#7.0.4 http://www.securityfocus.com/bid/84307 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3185 https://bugs.php.net/bug.php?id=70081 https://bugs.php.net/bug.php?id=71610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3185 https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba https://secure.php.net/ChangeLog-5.php#5.6.12 https://ubuntu.com/security/notices/USN-2952-1
|
php5-mysql |
CVE-2016-4070 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85801 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4070 https://bugs.php.net/bug.php?id=71798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070 https://git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
php5-mysql |
CVE-2016-4071 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85800 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4071 https://bugs.php.net/bug.php?id=71704 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4071 https://git.php.net/?p=php-src.git;a=commit;h=6e25966544fb1d2f3d7596e060ce9c9269bbdcf8 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://www.exploit-db.com/exploits/39645/
|
php5-mysql |
CVE-2016-4072 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85993 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4072 https://bugs.php.net/bug.php?id=71860 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4072 https://gist.github.com/smalyshev/80b5c2909832872f2ba2 https://git.php.net/?p=php-src.git;a=commit;h=1e9b175204e3286d64dfd6c9f09151c31b5e099a https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
php5-mysql |
CVE-2016-4073 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85991 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4073 https://bugs.php.net/bug.php?id=71906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4073 https://gist.github.com/smalyshev/d8355c96a657cc5dba70 https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
php5-mysql |
CVE-2016-4342 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/28/2 http://www.securityfocus.com/bid/89154 https://access.redhat.com/security/cve/CVE-2016-4342 https://bugs.php.net/bug.php?id=71354 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://ubuntu.com/security/notices/USN-2984-1
|
php5-mysql |
CVE-2016-4343 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/28/2 http://www.securityfocus.com/bid/89179 https://access.redhat.com/security/cve/CVE-2016-4343 https://bugs.php.net/bug.php?id=71331 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4343 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://ubuntu.com/security/notices/USN-2984-1
|
php5-mysql |
CVE-2016-4538 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90173 https://access.redhat.com/security/cve/CVE-2016-4538 https://bugs.php.net/bug.php?id=72093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538 https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-mysql |
CVE-2016-4539 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90174 https://access.redhat.com/security/cve/CVE-2016-4539 https://bugs.php.net/bug.php?id=72099 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539 https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-mysql |
CVE-2016-5385 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-7.php#7.0.9 http://rhn.redhat.com/errata/RHSA-2016-1609.html http://rhn.redhat.com/errata/RHSA-2016-1610.html http://rhn.redhat.com/errata/RHSA-2016-1611.html http://rhn.redhat.com/errata/RHSA-2016-1612.html http://rhn.redhat.com/errata/RHSA-2016-1613.html http://www.debian.org/security/2016/dsa-3631 http://www.kb.cert.org/vuls/id/797896 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91821 http://www.securitytracker.com/id/1036335 https://access.redhat.com/security/cve/CVE-2016-5385 https://bugzilla.redhat.com/show_bug.cgi?id=1353794 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385 https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml https://github.com/advisories/GHSA-m6ch-gg5f-wxx3 https://github.com/guzzle/guzzle/releases/tag/6.2.1 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://httpoxy.org/ https://linux.oracle.com/cve/CVE-2016-5385.html https://linux.oracle.com/errata/ELSA-2016-1613.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/ https://nvd.nist.gov/vuln/detail/CVE-2016-5385 https://security.gentoo.org/glsa/201611-22 https://typo3.org/security/advisory/typo3-core-sa-2016-019 https://ubuntu.com/security/notices/USN-3045-1 https://www.drupal.org/SA-CORE-2016-003
|
php5-mysql |
CVE-2016-5399 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://php.net/ChangeLog-7.php#7.0.9 http://rhn.redhat.com/errata/RHSA-2016-2598.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://seclists.org/fulldisclosure/2016/Jul/72 http://www.debian.org/security/2016/dsa-3631 http://www.openwall.com/lists/oss-security/2016/07/21/1 http://www.securityfocus.com/archive/1/538966/100/0/threaded http://www.securityfocus.com/bid/92051 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-5399 https://bugs.php.net/bug.php?id=72613 https://bugzilla.redhat.com/show_bug.cgi?id=1358395 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399 https://linux.oracle.com/cve/CVE-2016-5399.html https://linux.oracle.com/errata/ELSA-2016-2598.html https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3045-1 https://www.exploit-db.com/exploits/40155/
|
php5-mysql |
CVE-2016-5768 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/5b597a2e5b28e2d5a52fc1be13f425f08f47cb62?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2598.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91396 https://access.redhat.com/security/cve/CVE-2016-5768 https://bugs.php.net/bug.php?id=72402 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://linux.oracle.com/cve/CVE-2016-5768.html https://linux.oracle.com/errata/ELSA-2016-2598.html https://marc.info/?l=oss-security&m=146668499803695&w=2 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-5769 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91399 https://access.redhat.com/security/cve/CVE-2016-5769 https://bugs.php.net/bug.php?id=72455 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://marc.info/?l=oss-security&m=146668499803695&w=2 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-5772 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91398 https://access.redhat.com/security/cve/CVE-2016-5772 https://bugs.php.net/bug.php?id=72340 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-6288 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=629e4da7cc8b174acdeab84969cbfc606a019b31 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.securityfocus.com/bid/92111 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6288 https://bugs.php.net/70480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-6289 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92074 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6289 https://bugs.php.net/72513 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-6290 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=3798eb6fd5dddb211b01d41495072fd9858d4e32 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92097 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6290 https://bugs.php.net/72562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-6291 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=eebcbd5de38a0f1c2876035402cb770e37476519 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92073 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6291 https://bugs.php.net/72603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-6292 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=41131cd41d2fd2e0c2f332a27988df75659c42e4 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92078 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6292 https://bugs.php.net/72618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-6294 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92115 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6294 https://bugs.php.net/72533 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-6295 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=cab1c3b3708eead315e033359d07049b23b147a3 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92094 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6295 https://bugs.php.net/72479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-6296 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e6c48213c22ed50b2b987b479fcc1ac709394caa http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92095 http://www.securitytracker.com/id/1036430 http://www.ubuntu.com/usn/USN-3059-1 https://access.redhat.com/security/cve/CVE-2016-6296 https://bugs.php.net/72606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296 https://lists.debian.org/debian-lts-announce/2019/11/msg00029.html https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1 https://ubuntu.com/security/notices/USN-3059-1
|
php5-mysql |
CVE-2016-6297 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92099 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6297 https://bugs.php.net/72520 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-7127 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92757 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7127 https://bugs.php.net/bug.php?id=72730 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127 https://github.com/php/php-src/commit/1bd103df00f49cf4d4ade2cfe3f456ac058a4eae?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-7129 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92758 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7129 https://bugs.php.net/bug.php?id=72749 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129 https://github.com/php/php-src/commit/426aeb2808955ee3d3f52e0cfb102834cdb836a5?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-7130 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92764 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7130 https://bugs.php.net/bug.php?id=72750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130 https://github.com/php/php-src/commit/698a691724c0a949295991e5df091ce16f899e02?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-7131 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92768 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7131 https://bugs.php.net/bug.php?id=72790 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131 https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-7132 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92767 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7132 https://bugs.php.net/bug.php?id=72799 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132 https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-7411 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/93009 http://www.securitytracker.com/id/1036836 https://access.redhat.com/security/cve/CVE-2016-7411 https://bugs.php.net/bug.php?id=73052 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411 https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1
|
php5-mysql |
CVE-2016-7412 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93005 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7412 https://bugs.php.net/bug.php?id=72293 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412 https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-7413 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93006 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7413 https://bugs.php.net/bug.php?id=72860 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413 https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-7414 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93004 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7414 https://bugs.php.net/bug.php?id=72928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414 https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-7417 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93007 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7417 https://bugs.php.net/bug.php?id=73029 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417 https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-7478 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7 http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf http://www.securityfocus.com/bid/95150 https://access.redhat.com/security/cve/CVE-2016-7478 https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf https://bugs.php.net/bug.php?id=73093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://www.youtube.com/watch?v=LDcaPstAuPk
|
php5-mysql |
CVE-2016-7479 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7 http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf http://www.securityfocus.com/bid/95151 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7479 https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf https://bugs.php.net/bug.php?id=73092 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.youtube.com/watch?v=LDcaPstAuPk
|
php5-mysql |
CVE-2016-9934 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html http://www.openwall.com/lists/oss-security/2016/12/12/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/94845 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-9934 https://bugs.php.net/bug.php?id=73331 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934 https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d https://ubuntu.com/security/notices/USN-3196-1
|
php5-mysql |
CVE-2016-9935 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html http://www.debian.org/security/2016/dsa-3737 http://www.openwall.com/lists/oss-security/2016/12/12/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/94846 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-9935 https://bugs.php.net/bug.php?id=73631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935 https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 https://security.gentoo.org/glsa/201702-29 https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1
|
php5-mysql |
CVE-2017-11143 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://www.securityfocus.com/bid/99553 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11143 https://bugs.php.net/bug.php?id=74145 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143 https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
php5-mysql |
CVE-2017-11144 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=73cabfedf519298e1a11192699f44d53c529315e http://git.php.net/?p=php-src.git;a=commit;h=89637c6b41b510c20d262c17483f582f115c66d6 http://git.php.net/?p=php-src.git;a=commit;h=91826a311dd37f4c4e5d605fa7af331e80ddd4c3 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11144 https://bugs.php.net/bug.php?id=74651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
php5-mysql |
CVE-2017-11145 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e8b7698f5ee757ce2c8bd10a192a491a498f891c http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99550 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11145 https://bugs.php.net/bug.php?id=74819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145 https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
php5-mysql |
CVE-2017-11147 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99607 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11147 https://bugs.php.net/bug.php?id=73773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11147 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.tenable.com/security/tns-2017-12
|
php5-mysql |
CVE-2017-11628 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c http://www.securityfocus.com/bid/99489 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11628 https://bugs.php.net/bug.php?id=74603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628 https://security.gentoo.org/glsa/201709-21 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081
|
php5-mysql |
CVE-2017-9224 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/101244 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9224 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224 https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b https://github.com/kkos/oniguruma/issues/57 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-mysql |
CVE-2017-9226 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/101244 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226 https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6 https://github.com/kkos/oniguruma/issues/55 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-mysql |
CVE-2017-9227 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/100538 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9227 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227 https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814 https://github.com/kkos/oniguruma/issues/58 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-mysql |
CVE-2017-9228 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228 https://github.com/kkos/oniguruma/commit/3b63d12038c8d8fc278e81c942fa9bec7c704c8b https://github.com/kkos/oniguruma/issues/60 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-mysql |
CVE-2017-9229 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9229 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229 https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d https://github.com/kkos/oniguruma/issues/59 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-mysql |
CVE-2018-10545 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104022 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10545 https://bugs.php.net/bug.php?id=75605 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10545 https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
php5-mysql |
CVE-2018-10546 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104019 http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10546 https://bugs.php.net/bug.php?id=76249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546 https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://usn.ubuntu.com/3646-1/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
php5-mysql |
CVE-2018-10547 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10547 https://bugs.php.net/bug.php?id=76129 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547 https://linux.oracle.com/cve/CVE-2018-10547.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
php5-mysql |
CVE-2018-10548 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104019 http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10548 https://bugs.php.net/bug.php?id=76248 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548 https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12 https://www.tenable.com/security/tns-2019-07
|
php5-mysql |
CVE-2018-14883 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104871 https://access.redhat.com/security/cve/CVE-2018-14883 https://bugs.php.net/bug.php?id=76423 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883 https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-3766-1 https://ubuntu.com/security/notices/USN-3766-2 https://usn.ubuntu.com/3766-1/ https://usn.ubuntu.com/3766-2/ https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2018-12
|
php5-mysql |
CVE-2018-17082 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-17082 https://bugs.php.net/bug.php?id=76582 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082 https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e https://lists.debian.org/debian-lts-announce/2018/09/msg00020.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180924-0001/ https://ubuntu.com/security/notices/USN-3766-1 https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2019-07
|
php5-mysql |
CVE-2018-5712 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/102742 http://www.securityfocus.com/bid/104020 http://www.securitytracker.com/id/1040363 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-5712 https://bugs.php.net/bug.php?id=74782 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712 https://linux.oracle.com/cve/CVE-2018-5712.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html https://ubuntu.com/security/notices/USN-3566-1 https://ubuntu.com/security/notices/USN-3600-1 https://ubuntu.com/security/notices/USN-3600-2 https://usn.ubuntu.com/3566-1/ https://usn.ubuntu.com/3600-1/ https://usn.ubuntu.com/3600-2/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
php5-mysql |
CVE-2018-7584 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.24 |
Expand...http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/103204 http://www.securitytracker.com/id/1041607 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-7584 https://bugs.php.net/bug.php?id=75981 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584 https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba https://linux.oracle.com/cve/CVE-2018-7584.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://ubuntu.com/security/notices/USN-3600-1 https://ubuntu.com/security/notices/USN-3600-2 https://usn.ubuntu.com/3600-1/ https://usn.ubuntu.com/3600-2/ https://www.debian.org/security/2018/dsa-4240 https://www.exploit-db.com/exploits/44846/ https://www.tenable.com/security/tns-2018-03 https://www.tenable.com/security/tns-2018-12
|
php5-mysql |
CVE-2019-9020 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9020 https://bugs.php.net/bug.php?id=77242 https://bugs.php.net/bug.php?id=77249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020 https://linux.oracle.com/cve/CVE-2019-9020.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-mysql |
CVE-2019-9021 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/106747 http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9021 https://bugs.php.net/bug.php?id=77247 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9021 https://linux.oracle.com/cve/CVE-2019-9021.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-mysql |
CVE-2019-9022 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9022 https://bugs.php.net/bug.php?id=77369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9022 https://linux.oracle.com/cve/CVE-2019-9022.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4398 https://www.tenable.com/security/tns-2019-07
|
php5-mysql |
CVE-2019-9023 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9023 https://bugs.php.net/bug.php?id=77370 https://bugs.php.net/bug.php?id=77371 https://bugs.php.net/bug.php?id=77381 https://bugs.php.net/bug.php?id=77382 https://bugs.php.net/bug.php?id=77385 https://bugs.php.net/bug.php?id=77394 https://bugs.php.net/bug.php?id=77418 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023 https://linux.oracle.com/cve/CVE-2019-9023.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://support.f5.com/csp/article/K06372014 https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-mysql |
CVE-2019-9024 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9024 https://bugs.php.net/bug.php?id=77380 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024 https://linux.oracle.com/cve/CVE-2019-9024.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-mysql |
CVE-2019-9638 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9638 https://bugs.php.net/bug.php?id=77563 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638 https://linux.oracle.com/cve/CVE-2019-9638.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-mysql |
CVE-2019-9639 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9639 https://bugs.php.net/bug.php?id=77659 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639 https://linux.oracle.com/cve/CVE-2019-9639.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-mysql |
CVE-2019-9640 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9640 https://bugs.php.net/bug.php?id=77540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640 https://linux.oracle.com/cve/CVE-2019-9640.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-mysql |
CVE-2019-9641 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/security/cve/CVE-2019-9641 https://bugs.php.net/bug.php?id=77509 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641 https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-mysql |
CVE-2014-9767 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/16/20 http://www.securityfocus.com/bid/76652 http://www.securitytracker.com/id/1035311 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2014-9767 https://bugs.php.net/bug.php?id=67996 https://bugs.php.net/bug.php?id=70350 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9767 https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686 https://ubuntu.com/security/notices/USN-2952-1
|
php5-mysql |
CVE-2014-9912 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://www.openwall.com/lists/oss-security/2016/11/25/1 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/68549 https://access.redhat.com/security/cve/CVE-2014-9912 https://bugs.php.net/bug.php?id=67397 https://bugzilla.redhat.com/show_bug.cgi?id=1383569 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9912 https://marc.info/?l=oss-security&m=148003512008712&w=2 https://ubuntu.com/security/notices/USN-3196-1
|
php5-mysql |
CVE-2015-4116 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=1cbd25ca15383394ffa9ee8601c5de4c0f2f90e1 http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php https://access.redhat.com/security/cve/CVE-2015-4116 https://bugs.php.net/bug.php?id=69737 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116 https://ubuntu.com/security/notices/USN-3045-1 https://www.htbridge.com/advisory/HTB23262
|
php5-mysql |
CVE-2015-8865 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://bugs.gw.com/view.php?id=522 http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85802 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8865 https://bugs.php.net/bug.php?id=71527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865 https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://security.gentoo.org/glsa/201701-42 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://ubuntu.com/security/notices/USN-3686-1 https://ubuntu.com/security/notices/USN-3686-2 https://usn.ubuntu.com/3686-1/ https://usn.ubuntu.com/3686-2/
|
php5-mysql |
CVE-2015-8873 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=4d2278143a08b7522de9471d0f014d7357c28fea http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html https://access.redhat.com/security/cve/CVE-2015-8873 https://bugs.php.net/bug.php?id=69793 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8873 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2015-8994 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://marc.info/?l=php-internals&m=147876797317925&w=2 http://marc.info/?l=php-internals&m=147921016724565&w=2 http://openwall.com/lists/oss-security/2017/02/28/1 http://seclists.org/oss-sec/2016/q4/343 http://seclists.org/oss-sec/2017/q1/520 https://access.redhat.com/security/cve/CVE-2015-8994 https://bugs.php.net/bug.php?id=69090 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8994 https://ma.ttias.be/a-better-way-to-run-php-fpm/ https://ubuntu.com/security/notices/USN-3382-1
|
php5-mysql |
CVE-2016-10158 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95764 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10158 https://bugs.php.net/bug.php?id=73737 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158 https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-mysql |
CVE-2016-10159 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95774 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10159 https://bugs.php.net/bug.php?id=73764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159 https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93 https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-mysql |
CVE-2016-10161 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95768 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10161 https://bugs.php.net/bug.php?id=73825 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161 https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2 https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-mysql |
CVE-2016-10712 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.24 |
Expand...https://access.redhat.com/security/cve/CVE-2016-10712 https://bugs.php.net/bug.php?id=71323 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10712 https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5 https://ubuntu.com/security/notices/USN-3566-2 https://ubuntu.com/security/notices/USN-3600-1 https://usn.ubuntu.com/3566-2/ https://usn.ubuntu.com/3600-1/
|
php5-mysql |
CVE-2016-1903 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/01/14/8 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/79916 http://www.securitytracker.com/id/1034608 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-1903 https://bugs.php.net/bug.php?id=70976 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-2952-1
|
php5-mysql |
CVE-2016-3142 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/10/5 http://www.openwall.com/lists/oss-security/2016/03/13/2 http://www.securitytracker.com/id/1035255 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3142 https://bugs.php.net/bug.php?id=71498 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142 https://git.php.net/?p=php-src.git;a=commit;h=a6fdc5bb27b20d889de0cd29318b3968aabb57bd https://php.net/ChangeLog-5.php https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1
|
php5-mysql |
CVE-2016-4537 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90173 https://access.redhat.com/security/cve/CVE-2016-4537 https://bugs.php.net/bug.php?id=72093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537 https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-mysql |
CVE-2016-4540 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90172 https://access.redhat.com/security/cve/CVE-2016-4540 https://bugs.php.net/bug.php?id=72061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540 https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-mysql |
CVE-2016-4541 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90172 https://access.redhat.com/security/cve/CVE-2016-4541 https://bugs.php.net/bug.php?id=72061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541 https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-mysql |
CVE-2016-4542 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4542 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-mysql |
CVE-2016-4543 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4543 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-mysql |
CVE-2016-4544 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4544 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-mysql |
CVE-2016-5093 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90946 https://access.redhat.com/security/cve/CVE-2016-5093 https://bugs.php.net/bug.php?id=72241 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093 https://github.com/php/php-src/commit/97eff7eb57fc2320c267a949cffd622c38712484?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-5094 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90857 https://access.redhat.com/security/cve/CVE-2016-5094 https://bugs.php.net/bug.php?id=72135 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094 https://github.com/php/php-src/commit/0da8b8b801f9276359262f1ef8274c7812d3dfda?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-5095 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/92144 https://access.redhat.com/security/cve/CVE-2016-5095 https://bugs.php.net/bug.php?id=72135 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095 https://gist.github.com/8ef775c117d84ff15185953990a28576 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-5096 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90861 https://access.redhat.com/security/cve/CVE-2016-5096 https://bugs.php.net/bug.php?id=72114 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096 https://github.com/php/php-src/commit/abd159cce48f3e34f08e4751c568e09677d5ec9c?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-5114 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://seclists.org/bugtraq/2016/Jan/117 http://www.openwall.com/lists/oss-security/2016/02/02/4 http://www.openwall.com/lists/oss-security/2016/05/29/1 http://www.search-lab.hu/about-us/news/111-some-unusual-vulnerabilities-in-the-php-engine https://access.redhat.com/security/cve/CVE-2016-5114 https://bugs.php.net/bug.php?id=70755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-5771 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91401 https://access.redhat.com/security/cve/CVE-2016-5771 https://bugs.php.net/bug.php?id=72433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-mysql |
CVE-2016-5773 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91397 https://access.redhat.com/security/cve/CVE-2016-5773 https://bugs.php.net/bug.php?id=72434 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1 https://www.evonide.com/breaking-phps-garbage-collection-and-unserialize/
|
php5-mysql |
CVE-2016-7124 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92756 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7124 https://bugs.php.net/bug.php?id=72663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124 https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-7125 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92552 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7125 https://bugs.php.net/bug.php?id=72681 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125 https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-7128 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92564 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7128 https://bugs.php.net/bug.php?id=72627 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128 https://github.com/php/php-src/commit/6dbb1ee46b5f4725cc6519abf91e512a2a10dfed?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-7416 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93008 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7416 https://bugs.php.net/bug.php?id=73007 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416 https://github.com/php/php-src/commit/6d55ba265637d6adf0ba7e9c9ef11187d1ec2f5b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-7418 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93011 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7418 https://bugs.php.net/bug.php?id=73065 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418 https://github.com/php/php-src/commit/c4cca4c20e75359c9a13a1f9a36cb7b4e9601d29?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2016-9137 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f http://www.debian.org/security/2016/dsa-3698 http://www.openwall.com/lists/oss-security/2016/10/18/1 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93577 https://access.redhat.com/security/cve/CVE-2016-9137 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137 https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2016-19
|
php5-mysql |
CVE-2017-11362 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11362 https://bugs.php.net/bug.php?id=73473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11362 https://security.gentoo.org/glsa/201709-21 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3566-2 https://usn.ubuntu.com/3566-2/
|
php5-mysql |
CVE-2017-12933 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99490 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-12933 https://bugs.php.net/bug.php?id=74111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933 https://ubuntu.com/security/notices/USN-3566-1 https://ubuntu.com/security/notices/USN-3566-2 https://usn.ubuntu.com/3566-1/ https://usn.ubuntu.com/3566-2/ https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081
|
php5-mysql |
CVE-2017-16642 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/101745 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2017-16642 https://bugs.php.net/bug.php?id=75055 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642 https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536 https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1 https://security.netapp.com/advisory/ntap-20181123-0001/ https://ubuntu.com/security/notices/USN-3566-1 https://usn.ubuntu.com/3566-1/ https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.exploit-db.com/exploits/43133/
|
php5-mysql |
CVE-2018-14851 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104871 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-14851 https://bugs.php.net/bug.php?id=76557 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851 https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-3766-1 https://ubuntu.com/security/notices/USN-3766-2 https://usn.ubuntu.com/3766-1/ https://usn.ubuntu.com/3766-2/ https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2018-12
|
php5-mysql |
CVE-2019-9637 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9637 https://bugs.php.net/bug.php?id=77630 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637 https://linux.oracle.com/cve/CVE-2019-9637.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://support.f5.com/csp/article/K53825211 https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403 https://www.tenable.com/security/tns-2019-07
|
php5-mysql |
CVE-2019-9675 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://php.net/ChangeLog-7.php https://access.redhat.com/security/cve/CVE-2019-9675 https://bugs.php.net/bug.php?id=77586 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675 https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/
|
php5-readline |
CVE-2015-8835 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.securityfocus.com/bid/84426 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8835 https://bugs.php.net/bug.php?id=70081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835 https://ubuntu.com/security/notices/USN-2952-1
|
php5-readline |
CVE-2015-8838 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=97aa752fee61fccdec361279adbfb17a3c60f3f4 http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8838 https://bugs.php.net/bug.php?id=69669 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8838 https://ubuntu.com/security/notices/USN-2952-1
|
php5-readline |
CVE-2015-8866 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://framework.zend.com/security/advisory/ZF2015-06 -> Relation to CVE-2015-5161 http://git.php.net/?p=php-src.git;a=commit;h=de31324c221c1791b26350ba106cc26bad23ace9 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/21/8 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/87470 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8866 https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817 https://bugs.php.net/bug.php?id=64938 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866 https://ubuntu.com/security/notices/USN-2952-1
|
php5-readline |
CVE-2015-8867 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/21/8 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8867 https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1534203 https://bugs.php.net/bug.php?id=70014 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8867 https://ubuntu.com/security/notices/USN-2952-1
|
php5-readline |
CVE-2015-8876 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.php.net/ChangeLog-5.php https://access.redhat.com/security/cve/CVE-2015-8876 https://bugs.php.net/bug.php?id=70121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8876 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2015-8935 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/06/20/3 https://access.redhat.com/security/cve/CVE-2015-8935 https://bugs.php.net/bug.php?id=68978 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8935 https://github.com/php/php-src/commit/996faf964bba1aec06b153b370a7f20d3dd2bb8b?w=1 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-10160 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95783 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10160 https://bugs.php.net/bug.php?id=73768 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160 https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-readline |
CVE-2016-10397 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99552 https://access.redhat.com/security/cve/CVE-2016-10397 https://bugs.php.net/bug.php?id=73192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10397 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-readline |
CVE-2016-2554 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/02/22/5 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-2554 https://bugs.php.net/bug.php?id=71488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-2952-1
|
php5-readline |
CVE-2016-3141 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b1bd4119bcafab6f9a8f84d92cd65eec3afeface http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/10/5 http://www.openwall.com/lists/oss-security/2016/03/13/1 http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html http://www.securityfocus.com/bid/84271 http://www.securitytracker.com/id/1035255 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3141 https://bugs.php.net/bug.php?id=71587 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141 https://php.net/ChangeLog-5.php https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1
|
php5-readline |
CVE-2016-3185 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://php.net/ChangeLog-7.php#7.0.4 http://www.securityfocus.com/bid/84307 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3185 https://bugs.php.net/bug.php?id=70081 https://bugs.php.net/bug.php?id=71610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3185 https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba https://secure.php.net/ChangeLog-5.php#5.6.12 https://ubuntu.com/security/notices/USN-2952-1
|
php5-readline |
CVE-2016-4070 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85801 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4070 https://bugs.php.net/bug.php?id=71798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070 https://git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
php5-readline |
CVE-2016-4071 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85800 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4071 https://bugs.php.net/bug.php?id=71704 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4071 https://git.php.net/?p=php-src.git;a=commit;h=6e25966544fb1d2f3d7596e060ce9c9269bbdcf8 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://www.exploit-db.com/exploits/39645/
|
php5-readline |
CVE-2016-4072 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85993 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4072 https://bugs.php.net/bug.php?id=71860 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4072 https://gist.github.com/smalyshev/80b5c2909832872f2ba2 https://git.php.net/?p=php-src.git;a=commit;h=1e9b175204e3286d64dfd6c9f09151c31b5e099a https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
php5-readline |
CVE-2016-4073 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85991 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-4073 https://bugs.php.net/bug.php?id=71906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4073 https://gist.github.com/smalyshev/d8355c96a657cc5dba70 https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1
|
php5-readline |
CVE-2016-4342 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/28/2 http://www.securityfocus.com/bid/89154 https://access.redhat.com/security/cve/CVE-2016-4342 https://bugs.php.net/bug.php?id=71354 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://ubuntu.com/security/notices/USN-2984-1
|
php5-readline |
CVE-2016-4343 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/04/28/2 http://www.securityfocus.com/bid/89179 https://access.redhat.com/security/cve/CVE-2016-4343 https://bugs.php.net/bug.php?id=71331 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4343 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://ubuntu.com/security/notices/USN-2984-1
|
php5-readline |
CVE-2016-4538 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90173 https://access.redhat.com/security/cve/CVE-2016-4538 https://bugs.php.net/bug.php?id=72093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538 https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-readline |
CVE-2016-4539 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90174 https://access.redhat.com/security/cve/CVE-2016-4539 https://bugs.php.net/bug.php?id=72099 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539 https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-readline |
CVE-2016-5385 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-7.php#7.0.9 http://rhn.redhat.com/errata/RHSA-2016-1609.html http://rhn.redhat.com/errata/RHSA-2016-1610.html http://rhn.redhat.com/errata/RHSA-2016-1611.html http://rhn.redhat.com/errata/RHSA-2016-1612.html http://rhn.redhat.com/errata/RHSA-2016-1613.html http://www.debian.org/security/2016/dsa-3631 http://www.kb.cert.org/vuls/id/797896 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91821 http://www.securitytracker.com/id/1036335 https://access.redhat.com/security/cve/CVE-2016-5385 https://bugzilla.redhat.com/show_bug.cgi?id=1353794 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385 https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml https://github.com/advisories/GHSA-m6ch-gg5f-wxx3 https://github.com/guzzle/guzzle/releases/tag/6.2.1 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://httpoxy.org/ https://linux.oracle.com/cve/CVE-2016-5385.html https://linux.oracle.com/errata/ELSA-2016-1613.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/ https://nvd.nist.gov/vuln/detail/CVE-2016-5385 https://security.gentoo.org/glsa/201611-22 https://typo3.org/security/advisory/typo3-core-sa-2016-019 https://ubuntu.com/security/notices/USN-3045-1 https://www.drupal.org/SA-CORE-2016-003
|
php5-readline |
CVE-2016-5399 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://php.net/ChangeLog-7.php#7.0.9 http://rhn.redhat.com/errata/RHSA-2016-2598.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://seclists.org/fulldisclosure/2016/Jul/72 http://www.debian.org/security/2016/dsa-3631 http://www.openwall.com/lists/oss-security/2016/07/21/1 http://www.securityfocus.com/archive/1/538966/100/0/threaded http://www.securityfocus.com/bid/92051 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-5399 https://bugs.php.net/bug.php?id=72613 https://bugzilla.redhat.com/show_bug.cgi?id=1358395 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399 https://linux.oracle.com/cve/CVE-2016-5399.html https://linux.oracle.com/errata/ELSA-2016-2598.html https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3045-1 https://www.exploit-db.com/exploits/40155/
|
php5-readline |
CVE-2016-5768 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/5b597a2e5b28e2d5a52fc1be13f425f08f47cb62?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2598.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91396 https://access.redhat.com/security/cve/CVE-2016-5768 https://bugs.php.net/bug.php?id=72402 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://linux.oracle.com/cve/CVE-2016-5768.html https://linux.oracle.com/errata/ELSA-2016-2598.html https://marc.info/?l=oss-security&m=146668499803695&w=2 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-5769 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91399 https://access.redhat.com/security/cve/CVE-2016-5769 https://bugs.php.net/bug.php?id=72455 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://marc.info/?l=oss-security&m=146668499803695&w=2 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-5772 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91398 https://access.redhat.com/security/cve/CVE-2016-5772 https://bugs.php.net/bug.php?id=72340 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-6288 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=629e4da7cc8b174acdeab84969cbfc606a019b31 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.securityfocus.com/bid/92111 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6288 https://bugs.php.net/70480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-6289 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92074 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6289 https://bugs.php.net/72513 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-6290 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=3798eb6fd5dddb211b01d41495072fd9858d4e32 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92097 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6290 https://bugs.php.net/72562 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-6291 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=eebcbd5de38a0f1c2876035402cb770e37476519 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92073 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6291 https://bugs.php.net/72603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-6292 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=41131cd41d2fd2e0c2f332a27988df75659c42e4 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92078 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6292 https://bugs.php.net/72618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-6294 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92115 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6294 https://bugs.php.net/72533 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-6295 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=cab1c3b3708eead315e033359d07049b23b147a3 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92094 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6295 https://bugs.php.net/72479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-6296 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e6c48213c22ed50b2b987b479fcc1ac709394caa http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92095 http://www.securitytracker.com/id/1036430 http://www.ubuntu.com/usn/USN-3059-1 https://access.redhat.com/security/cve/CVE-2016-6296 https://bugs.php.net/72606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296 https://lists.debian.org/debian-lts-announce/2019/11/msg00029.html https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1 https://ubuntu.com/security/notices/USN-3059-1
|
php5-readline |
CVE-2016-6297 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://openwall.com/lists/oss-security/2016/07/24/2 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3631 http://www.securityfocus.com/bid/92099 http://www.securitytracker.com/id/1036430 https://access.redhat.com/security/cve/CVE-2016-6297 https://bugs.php.net/72520 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297 https://security.gentoo.org/glsa/201611-22 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-7127 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92757 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7127 https://bugs.php.net/bug.php?id=72730 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127 https://github.com/php/php-src/commit/1bd103df00f49cf4d4ade2cfe3f456ac058a4eae?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-7129 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92758 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7129 https://bugs.php.net/bug.php?id=72749 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129 https://github.com/php/php-src/commit/426aeb2808955ee3d3f52e0cfb102834cdb836a5?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-7130 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92764 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7130 https://bugs.php.net/bug.php?id=72750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130 https://github.com/php/php-src/commit/698a691724c0a949295991e5df091ce16f899e02?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-7131 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92768 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7131 https://bugs.php.net/bug.php?id=72790 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131 https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-7132 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92767 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7132 https://bugs.php.net/bug.php?id=72799 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132 https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-7411 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/93009 http://www.securitytracker.com/id/1036836 https://access.redhat.com/security/cve/CVE-2016-7411 https://bugs.php.net/bug.php?id=73052 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411 https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1
|
php5-readline |
CVE-2016-7412 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93005 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7412 https://bugs.php.net/bug.php?id=72293 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412 https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-7413 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93006 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7413 https://bugs.php.net/bug.php?id=72860 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413 https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-7414 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93004 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7414 https://bugs.php.net/bug.php?id=72928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414 https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-7417 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93007 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7417 https://bugs.php.net/bug.php?id=73029 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417 https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-7478 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7 http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf http://www.securityfocus.com/bid/95150 https://access.redhat.com/security/cve/CVE-2016-7478 https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf https://bugs.php.net/bug.php?id=73093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://www.youtube.com/watch?v=LDcaPstAuPk
|
php5-readline |
CVE-2016-7479 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7 http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf http://www.securityfocus.com/bid/95151 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7479 https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf https://bugs.php.net/bug.php?id=73092 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.youtube.com/watch?v=LDcaPstAuPk
|
php5-readline |
CVE-2016-9934 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html http://www.openwall.com/lists/oss-security/2016/12/12/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/94845 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-9934 https://bugs.php.net/bug.php?id=73331 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934 https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d https://ubuntu.com/security/notices/USN-3196-1
|
php5-readline |
CVE-2016-9935 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html http://www.debian.org/security/2016/dsa-3737 http://www.openwall.com/lists/oss-security/2016/12/12/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/94846 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-9935 https://bugs.php.net/bug.php?id=73631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935 https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 https://security.gentoo.org/glsa/201702-29 https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1
|
php5-readline |
CVE-2017-11143 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://www.securityfocus.com/bid/99553 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11143 https://bugs.php.net/bug.php?id=74145 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143 https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
php5-readline |
CVE-2017-11144 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=73cabfedf519298e1a11192699f44d53c529315e http://git.php.net/?p=php-src.git;a=commit;h=89637c6b41b510c20d262c17483f582f115c66d6 http://git.php.net/?p=php-src.git;a=commit;h=91826a311dd37f4c4e5d605fa7af331e80ddd4c3 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11144 https://bugs.php.net/bug.php?id=74651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
php5-readline |
CVE-2017-11145 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e8b7698f5ee757ce2c8bd10a192a491a498f891c http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99550 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11145 https://bugs.php.net/bug.php?id=74819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145 https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.tenable.com/security/tns-2017-12
|
php5-readline |
CVE-2017-11147 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451 http://openwall.com/lists/oss-security/2017/07/10/6 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99607 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11147 https://bugs.php.net/bug.php?id=73773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11147 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.tenable.com/security/tns-2017-12
|
php5-readline |
CVE-2017-11628 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c http://www.securityfocus.com/bid/99489 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11628 https://bugs.php.net/bug.php?id=74603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628 https://security.gentoo.org/glsa/201709-21 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2 https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081
|
php5-readline |
CVE-2017-9224 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/101244 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9224 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224 https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b https://github.com/kkos/oniguruma/issues/57 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-readline |
CVE-2017-9226 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/101244 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226 https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6 https://github.com/kkos/oniguruma/issues/55 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-readline |
CVE-2017-9227 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://www.securityfocus.com/bid/100538 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9227 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227 https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814 https://github.com/kkos/oniguruma/issues/58 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-readline |
CVE-2017-9228 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228 https://github.com/kkos/oniguruma/commit/3b63d12038c8d8fc278e81c942fa9bec7c704c8b https://github.com/kkos/oniguruma/issues/60 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-readline |
CVE-2017-9229 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-9229 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229 https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d https://github.com/kkos/oniguruma/issues/59 https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3382-2
|
php5-readline |
CVE-2018-10545 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104022 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10545 https://bugs.php.net/bug.php?id=75605 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10545 https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
php5-readline |
CVE-2018-10546 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104019 http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10546 https://bugs.php.net/bug.php?id=76249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546 https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://usn.ubuntu.com/3646-1/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
php5-readline |
CVE-2018-10547 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10547 https://bugs.php.net/bug.php?id=76129 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547 https://linux.oracle.com/cve/CVE-2018-10547.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12
|
php5-readline |
CVE-2018-10548 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.25 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104019 http://www.securitytracker.com/id/1040807 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-10548 https://bugs.php.net/bug.php?id=76248 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548 https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180607-0003/ https://ubuntu.com/security/notices/USN-3646-1 https://ubuntu.com/security/notices/USN-3646-2 https://usn.ubuntu.com/3646-1/ https://usn.ubuntu.com/3646-2/ https://www.debian.org/security/2018/dsa-4240 https://www.tenable.com/security/tns-2018-12 https://www.tenable.com/security/tns-2019-07
|
php5-readline |
CVE-2018-14883 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104871 https://access.redhat.com/security/cve/CVE-2018-14883 https://bugs.php.net/bug.php?id=76423 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883 https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-3766-1 https://ubuntu.com/security/notices/USN-3766-2 https://usn.ubuntu.com/3766-1/ https://usn.ubuntu.com/3766-2/ https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2018-12
|
php5-readline |
CVE-2018-17082 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-17082 https://bugs.php.net/bug.php?id=76582 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082 https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e https://lists.debian.org/debian-lts-announce/2018/09/msg00020.html https://security.gentoo.org/glsa/201812-01 https://security.netapp.com/advisory/ntap-20180924-0001/ https://ubuntu.com/security/notices/USN-3766-1 https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2019-07
|
php5-readline |
CVE-2018-5712 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/102742 http://www.securityfocus.com/bid/104020 http://www.securitytracker.com/id/1040363 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-5712 https://bugs.php.net/bug.php?id=74782 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712 https://linux.oracle.com/cve/CVE-2018-5712.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html https://ubuntu.com/security/notices/USN-3566-1 https://ubuntu.com/security/notices/USN-3600-1 https://ubuntu.com/security/notices/USN-3600-2 https://usn.ubuntu.com/3566-1/ https://usn.ubuntu.com/3600-1/ https://usn.ubuntu.com/3600-2/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
php5-readline |
CVE-2018-7584 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.24 |
Expand...http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/103204 http://www.securitytracker.com/id/1041607 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-7584 https://bugs.php.net/bug.php?id=75981 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584 https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba https://linux.oracle.com/cve/CVE-2018-7584.html https://linux.oracle.com/errata/ELSA-2020-1112.html https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html https://ubuntu.com/security/notices/USN-3600-1 https://ubuntu.com/security/notices/USN-3600-2 https://usn.ubuntu.com/3600-1/ https://usn.ubuntu.com/3600-2/ https://www.debian.org/security/2018/dsa-4240 https://www.exploit-db.com/exploits/44846/ https://www.tenable.com/security/tns-2018-03 https://www.tenable.com/security/tns-2018-12
|
php5-readline |
CVE-2019-9020 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9020 https://bugs.php.net/bug.php?id=77242 https://bugs.php.net/bug.php?id=77249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020 https://linux.oracle.com/cve/CVE-2019-9020.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-readline |
CVE-2019-9021 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/106747 http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9021 https://bugs.php.net/bug.php?id=77247 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9021 https://linux.oracle.com/cve/CVE-2019-9021.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-readline |
CVE-2019-9022 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9022 https://bugs.php.net/bug.php?id=77369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9022 https://linux.oracle.com/cve/CVE-2019-9022.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4398 https://www.tenable.com/security/tns-2019-07
|
php5-readline |
CVE-2019-9023 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9023 https://bugs.php.net/bug.php?id=77370 https://bugs.php.net/bug.php?id=77371 https://bugs.php.net/bug.php?id=77381 https://bugs.php.net/bug.php?id=77382 https://bugs.php.net/bug.php?id=77385 https://bugs.php.net/bug.php?id=77394 https://bugs.php.net/bug.php?id=77418 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023 https://linux.oracle.com/cve/CVE-2019-9023.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://support.f5.com/csp/article/K06372014 https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-readline |
CVE-2019-9024 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.27 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://www.securityfocus.com/bid/107156 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9024 https://bugs.php.net/bug.php?id=77380 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024 https://linux.oracle.com/cve/CVE-2019-9024.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://security.netapp.com/advisory/ntap-20190321-0001/ https://ubuntu.com/security/notices/USN-3902-1 https://ubuntu.com/security/notices/USN-3902-2 https://usn.ubuntu.com/3902-1/ https://usn.ubuntu.com/3902-2/ https://www.debian.org/security/2019/dsa-4398
|
php5-readline |
CVE-2019-9638 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9638 https://bugs.php.net/bug.php?id=77563 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638 https://linux.oracle.com/cve/CVE-2019-9638.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-readline |
CVE-2019-9639 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9639 https://bugs.php.net/bug.php?id=77659 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639 https://linux.oracle.com/cve/CVE-2019-9639.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-readline |
CVE-2019-9640 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9640 https://bugs.php.net/bug.php?id=77540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640 https://linux.oracle.com/cve/CVE-2019-9640.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-readline |
CVE-2019-9641 |
MEDIUM |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/security/cve/CVE-2019-9641 https://bugs.php.net/bug.php?id=77509 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641 https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403
|
php5-readline |
CVE-2014-9767 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/16/20 http://www.securityfocus.com/bid/76652 http://www.securitytracker.com/id/1035311 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2014-9767 https://bugs.php.net/bug.php?id=67996 https://bugs.php.net/bug.php?id=70350 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9767 https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686 https://ubuntu.com/security/notices/USN-2952-1
|
php5-readline |
CVE-2014-9912 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://www.openwall.com/lists/oss-security/2016/11/25/1 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/68549 https://access.redhat.com/security/cve/CVE-2014-9912 https://bugs.php.net/bug.php?id=67397 https://bugzilla.redhat.com/show_bug.cgi?id=1383569 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9912 https://marc.info/?l=oss-security&m=148003512008712&w=2 https://ubuntu.com/security/notices/USN-3196-1
|
php5-readline |
CVE-2015-4116 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=1cbd25ca15383394ffa9ee8601c5de4c0f2f90e1 http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php https://access.redhat.com/security/cve/CVE-2015-4116 https://bugs.php.net/bug.php?id=69737 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116 https://ubuntu.com/security/notices/USN-3045-1 https://www.htbridge.com/advisory/HTB23262
|
php5-readline |
CVE-2015-8865 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://bugs.gw.com/view.php?id=522 http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85802 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8865 https://bugs.php.net/bug.php?id=71527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865 https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://security.gentoo.org/glsa/201701-42 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://ubuntu.com/security/notices/USN-3686-1 https://ubuntu.com/security/notices/USN-3686-2 https://usn.ubuntu.com/3686-1/ https://usn.ubuntu.com/3686-2/
|
php5-readline |
CVE-2015-8873 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=4d2278143a08b7522de9471d0f014d7357c28fea http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html https://access.redhat.com/security/cve/CVE-2015-8873 https://bugs.php.net/bug.php?id=69793 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8873 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2015-8994 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...http://marc.info/?l=php-internals&m=147876797317925&w=2 http://marc.info/?l=php-internals&m=147921016724565&w=2 http://openwall.com/lists/oss-security/2017/02/28/1 http://seclists.org/oss-sec/2016/q4/343 http://seclists.org/oss-sec/2017/q1/520 https://access.redhat.com/security/cve/CVE-2015-8994 https://bugs.php.net/bug.php?id=69090 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8994 https://ma.ttias.be/a-better-way-to-run-php-fpm/ https://ubuntu.com/security/notices/USN-3382-1
|
php5-readline |
CVE-2016-10158 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95764 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10158 https://bugs.php.net/bug.php?id=73737 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158 https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-readline |
CVE-2016-10159 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95774 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10159 https://bugs.php.net/bug.php?id=73764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159 https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93 https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-readline |
CVE-2016-10161 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.debian.org/security/2017/dsa-3783 http://www.securityfocus.com/bid/95768 http://www.securitytracker.com/id/1037659 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-10161 https://bugs.php.net/bug.php?id=73825 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161 https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2 https://security.gentoo.org/glsa/201702-29 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2017-04
|
php5-readline |
CVE-2016-10712 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.24 |
Expand...https://access.redhat.com/security/cve/CVE-2016-10712 https://bugs.php.net/bug.php?id=71323 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10712 https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5 https://ubuntu.com/security/notices/USN-3566-2 https://ubuntu.com/security/notices/USN-3600-1 https://usn.ubuntu.com/3566-2/ https://usn.ubuntu.com/3600-1/
|
php5-readline |
CVE-2016-1903 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/01/14/8 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/79916 http://www.securitytracker.com/id/1034608 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-1903 https://bugs.php.net/bug.php?id=70976 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-2952-1
|
php5-readline |
CVE-2016-3142 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.16 |
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/03/10/5 http://www.openwall.com/lists/oss-security/2016/03/13/2 http://www.securitytracker.com/id/1035255 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2016-3142 https://bugs.php.net/bug.php?id=71498 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142 https://git.php.net/?p=php-src.git;a=commit;h=a6fdc5bb27b20d889de0cd29318b3968aabb57bd https://php.net/ChangeLog-5.php https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1
|
php5-readline |
CVE-2016-4537 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90173 https://access.redhat.com/security/cve/CVE-2016-4537 https://bugs.php.net/bug.php?id=72093 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537 https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-readline |
CVE-2016-4540 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90172 https://access.redhat.com/security/cve/CVE-2016-4540 https://bugs.php.net/bug.php?id=72061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540 https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-readline |
CVE-2016-4541 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/90172 https://access.redhat.com/security/cve/CVE-2016-4541 https://bugs.php.net/bug.php?id=72061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541 https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-readline |
CVE-2016-4542 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4542 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-readline |
CVE-2016-4543 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4543 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-readline |
CVE-2016-4544 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.17 |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/05/21 http://www.securityfocus.com/bid/89844 https://access.redhat.com/security/cve/CVE-2016-4544 https://bugs.php.net/bug.php?id=72094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544 https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-2984-1
|
php5-readline |
CVE-2016-5093 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90946 https://access.redhat.com/security/cve/CVE-2016-5093 https://bugs.php.net/bug.php?id=72241 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093 https://github.com/php/php-src/commit/97eff7eb57fc2320c267a949cffd622c38712484?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-5094 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90857 https://access.redhat.com/security/cve/CVE-2016-5094 https://bugs.php.net/bug.php?id=72135 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094 https://github.com/php/php-src/commit/0da8b8b801f9276359262f1ef8274c7812d3dfda?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-5095 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/92144 https://access.redhat.com/security/cve/CVE-2016-5095 https://bugs.php.net/bug.php?id=72135 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095 https://gist.github.com/8ef775c117d84ff15185953990a28576 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-5096 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3602 http://www.openwall.com/lists/oss-security/2016/05/25/3 http://www.openwall.com/lists/oss-security/2016/05/26/3 http://www.securityfocus.com/bid/90861 https://access.redhat.com/security/cve/CVE-2016-5096 https://bugs.php.net/bug.php?id=72114 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096 https://github.com/php/php-src/commit/abd159cce48f3e34f08e4751c568e09677d5ec9c?w=1 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-5114 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1 http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://seclists.org/bugtraq/2016/Jan/117 http://www.openwall.com/lists/oss-security/2016/02/02/4 http://www.openwall.com/lists/oss-security/2016/05/29/1 http://www.search-lab.hu/about-us/news/111-some-unusual-vulnerabilities-in-the-php-engine https://access.redhat.com/security/cve/CVE-2016-5114 https://bugs.php.net/bug.php?id=70755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-5771 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-5.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91401 https://access.redhat.com/security/cve/CVE-2016-5771 https://bugs.php.net/bug.php?id=72433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1
|
php5-readline |
CVE-2016-5773 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.19 |
Expand...http://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6?w=1 http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3618 http://www.openwall.com/lists/oss-security/2016/06/23/4 http://www.securityfocus.com/bid/91397 https://access.redhat.com/security/cve/CVE-2016-5773 https://bugs.php.net/bug.php?id=72434 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3045-1 https://www.evonide.com/breaking-phps-garbage-collection-and-unserialize/
|
php5-readline |
CVE-2016-7124 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92756 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7124 https://bugs.php.net/bug.php?id=72663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124 https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-7125 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92552 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7125 https://bugs.php.net/bug.php?id=72681 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125 https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-7128 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://openwall.com/lists/oss-security/2016/09/02/9 http://php.net/ChangeLog-5.php#5.6.25 http://php.net/ChangeLog-7.php#7.0.10 http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.openwall.com/lists/oss-security/2016/09/02/5 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/92564 http://www.securitytracker.com/id/1036680 https://access.redhat.com/security/cve/CVE-2016-7128 https://bugs.php.net/bug.php?id=72627 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128 https://github.com/php/php-src/commit/6dbb1ee46b5f4725cc6519abf91e512a2a10dfed?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-7416 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93008 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7416 https://bugs.php.net/bug.php?id=73007 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416 https://github.com/php/php-src/commit/6d55ba265637d6adf0ba7e9c9ef11187d1ec2f5b?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-7418 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.20 |
Expand...http://php.net/ChangeLog-5.php#5.6.26 http://php.net/ChangeLog-7.php#7.0.11 http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.openwall.com/lists/oss-security/2016/09/15/6 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93011 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2016-7418 https://bugs.php.net/bug.php?id=73065 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418 https://github.com/php/php-src/commit/c4cca4c20e75359c9a13a1f9a36cb7b4e9601d29?w=1 https://security.gentoo.org/glsa/201611-22 https://ubuntu.com/security/notices/USN-3095-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2016-9137 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.21 |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f http://www.debian.org/security/2016/dsa-3698 http://www.openwall.com/lists/oss-security/2016/10/18/1 http://www.openwall.com/lists/oss-security/2016/11/01/2 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93577 https://access.redhat.com/security/cve/CVE-2016-9137 https://bugs.php.net/bug.php?id=73147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137 https://ubuntu.com/security/notices/USN-3196-1 https://ubuntu.com/security/notices/USN-3211-1 https://www.tenable.com/security/tns-2016-19
|
php5-readline |
CVE-2017-11362 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.22 |
Expand...https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-11362 https://bugs.php.net/bug.php?id=73473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11362 https://security.gentoo.org/glsa/201709-21 https://security.netapp.com/advisory/ntap-20180112-0001/ https://ubuntu.com/security/notices/USN-3382-1 https://ubuntu.com/security/notices/USN-3566-2 https://usn.ubuntu.com/3566-2/
|
php5-readline |
CVE-2017-12933 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/99490 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/security/cve/CVE-2017-12933 https://bugs.php.net/bug.php?id=74111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933 https://ubuntu.com/security/notices/USN-3566-1 https://ubuntu.com/security/notices/USN-3566-2 https://usn.ubuntu.com/3566-1/ https://usn.ubuntu.com/3566-2/ https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081
|
php5-readline |
CVE-2017-16642 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.23 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/101745 https://access.redhat.com/errata/RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2017-16642 https://bugs.php.net/bug.php?id=75055 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642 https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536 https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1 https://security.netapp.com/advisory/ntap-20181123-0001/ https://ubuntu.com/security/notices/USN-3566-1 https://usn.ubuntu.com/3566-1/ https://www.debian.org/security/2018/dsa-4080 https://www.debian.org/security/2018/dsa-4081 https://www.exploit-db.com/exploits/43133/
|
php5-readline |
CVE-2018-14851 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.26 |
Expand...http://php.net/ChangeLog-5.php http://php.net/ChangeLog-7.php http://www.securityfocus.com/bid/104871 https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/security/cve/CVE-2018-14851 https://bugs.php.net/bug.php?id=76557 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851 https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html https://security.netapp.com/advisory/ntap-20181107-0003/ https://ubuntu.com/security/notices/USN-3766-1 https://ubuntu.com/security/notices/USN-3766-2 https://usn.ubuntu.com/3766-1/ https://usn.ubuntu.com/3766-2/ https://www.debian.org/security/2018/dsa-4353 https://www.tenable.com/security/tns-2018-12
|
php5-readline |
CVE-2019-9637 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html https://access.redhat.com/errata/RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:3299 https://access.redhat.com/security/cve/CVE-2019-9637 https://bugs.php.net/bug.php?id=77630 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637 https://linux.oracle.com/cve/CVE-2019-9637.html https://linux.oracle.com/errata/ELSA-2020-1624.html https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html https://security.netapp.com/advisory/ntap-20190502-0007/ https://support.f5.com/csp/article/K53825211 https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-1/ https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/ https://www.debian.org/security/2019/dsa-4403 https://www.tenable.com/security/tns-2019-07
|
php5-readline |
CVE-2019-9675 |
LOW |
5.5.9+dfsg-1ubuntu4.14 |
5.5.9+dfsg-1ubuntu4.29 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html http://php.net/ChangeLog-7.php https://access.redhat.com/security/cve/CVE-2019-9675 https://bugs.php.net/bug.php?id=77586 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675 https://ubuntu.com/security/notices/USN-3922-1 https://ubuntu.com/security/notices/USN-3922-2 https://ubuntu.com/security/notices/USN-3922-3 https://usn.ubuntu.com/3922-2/ https://usn.ubuntu.com/3922-3/
|
procps |
CVE-2018-1122 |
MEDIUM |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 https://access.redhat.com/errata/RHSA-2019:2189 https://access.redhat.com/errata/RHSA-2020:0595 https://access.redhat.com/security/cve/CVE-2018-1122 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1122 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1122 https://linux.oracle.com/cve/CVE-2018-1122.html https://linux.oracle.com/errata/ELSA-2019-2189.html https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html https://security.gentoo.org/glsa/201805-14 https://ubuntu.com/security/notices/USN-3658-1 https://ubuntu.com/security/notices/USN-3658-3 https://usn.ubuntu.com/3658-1/ https://usn.ubuntu.com/3658-3/ https://www.debian.org/security/2018/dsa-4208 https://www.exploit-db.com/exploits/44806/ https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
procps |
CVE-2018-1123 |
MEDIUM |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 https://access.redhat.com/security/cve/CVE-2018-1123 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html https://security.gentoo.org/glsa/201805-14 https://ubuntu.com/security/notices/USN-3658-1 https://ubuntu.com/security/notices/USN-3658-3 https://usn.ubuntu.com/3658-1/ https://usn.ubuntu.com/3658-3/ https://www.debian.org/security/2018/dsa-4208 https://www.exploit-db.com/exploits/44806/ https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
procps |
CVE-2018-1124 |
MEDIUM |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 http://www.securitytracker.com/id/1041057 https://access.redhat.com/errata/RHSA-2018:1700 https://access.redhat.com/errata/RHSA-2018:1777 https://access.redhat.com/errata/RHSA-2018:1820 https://access.redhat.com/errata/RHSA-2018:2267 https://access.redhat.com/errata/RHSA-2018:2268 https://access.redhat.com/errata/RHSA-2019:1944 https://access.redhat.com/errata/RHSA-2019:2401 https://access.redhat.com/security/cve/CVE-2018-1124 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124 https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 https://kc.mcafee.com/corporate/index?page=content&id=SB10241 https://linux.oracle.com/cve/CVE-2018-1124.html https://linux.oracle.com/errata/ELSA-2018-1777.html https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html https://security.gentoo.org/glsa/201805-14 https://ubuntu.com/security/notices/USN-3658-1 https://ubuntu.com/security/notices/USN-3658-2 https://usn.ubuntu.com/3658-1/ https://usn.ubuntu.com/3658-2/ https://www.debian.org/security/2018/dsa-4208 https://www.exploit-db.com/exploits/44806/ https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
procps |
CVE-2018-1125 |
MEDIUM |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 https://access.redhat.com/security/cve/CVE-2018-1125 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125 https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html https://ubuntu.com/security/notices/USN-3658-1 https://ubuntu.com/security/notices/USN-3658-3 https://usn.ubuntu.com/3658-1/ https://usn.ubuntu.com/3658-3/ https://www.debian.org/security/2018/dsa-4208 https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
procps |
CVE-2018-1126 |
MEDIUM |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 http://www.securitytracker.com/id/1041057 https://access.redhat.com/errata/RHSA-2018:1700 https://access.redhat.com/errata/RHSA-2018:1777 https://access.redhat.com/errata/RHSA-2018:1820 https://access.redhat.com/errata/RHSA-2018:2267 https://access.redhat.com/errata/RHSA-2018:2268 https://access.redhat.com/errata/RHSA-2019:1944 https://access.redhat.com/security/cve/CVE-2018-1126 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1126 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1126 https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 https://linux.oracle.com/cve/CVE-2018-1126.html https://linux.oracle.com/errata/ELSA-2018-1777.html https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html https://ubuntu.com/security/notices/USN-3658-1 https://ubuntu.com/security/notices/USN-3658-2 https://usn.ubuntu.com/3658-1/ https://usn.ubuntu.com/3658-2/ https://www.debian.org/security/2018/dsa-4208 https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
python2.7 |
CVE-2016-0772 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/9 http://www.securityfocus.com/bid/91225 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-0772 https://bugzilla.redhat.com/show_bug.cgi?id=1303647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://hg.python.org/cpython/rev/b3ce713fb9be https://hg.python.org/cpython/rev/d590114c2394 https://linux.oracle.com/cve/CVE-2016-0772.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
python2.7 |
CVE-2016-1000110 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2016-1000110 https://bugs.python.org/issue27568 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110 https://linux.oracle.com/cve/CVE-2016-1000110.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/ https://security-tracker.debian.org/tracker/CVE-2016-1000110 https://ubuntu.com/security/notices/USN-3134-1
|
python2.7 |
CVE-2016-5636 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-2586.html http://www.openwall.com/lists/oss-security/2016/06/15/15 http://www.openwall.com/lists/oss-security/2016/06/16/1 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91247 http://www.securitytracker.com/id/1038138 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5636 https://bugs.python.org/issue26171 https://bugs.python.org/msg278228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://linux.oracle.com/cve/CVE-2016-5636.html https://linux.oracle.com/errata/ELSA-2016-2586.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
python2.7 |
CVE-2016-5699 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/7 http://www.openwall.com/lists/oss-security/2016/06/15/12 http://www.openwall.com/lists/oss-security/2016/06/16/2 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91226 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5699 https://bugs.python.org/issue22928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4 https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS https://hg.python.org/cpython/rev/1c45047c5102 https://hg.python.org/cpython/rev/bf3e1c9b80e9 https://linux.oracle.com/cve/CVE-2016-5699.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://ubuntu.com/security/notices/USN-3134-1
|
python2.7 |
CVE-2017-1000158 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.4 |
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html http://www.securitytracker.com/id/1039890 https://access.redhat.com/security/cve/CVE-2017-1000158 https://bugs.python.org/issue30657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158 https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://security.gentoo.org/glsa/201805-02 https://ubuntu.com/security/notices/USN-3496-1 https://ubuntu.com/security/notices/USN-3496-2 https://ubuntu.com/security/notices/USN-3496-3 https://www.debian.org/security/2018/dsa-4307
|
python2.7 |
CVE-2018-1000802 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2018-1000802 https://bugs.python.org/issue34540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802 https://github.com/python/cpython/pull/8985 https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306
|
python2.7 |
CVE-2018-14647 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securityfocus.com/bid/105396 http://www.securitytracker.com/id/1041740 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:2030 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-14647 https://bugs.python.org/issue34623 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647 https://linux.oracle.com/cve/CVE-2018-14647.html https://linux.oracle.com/errata/ELSA-2019-2030.html https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/ https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
python2.7 |
CVE-2018-1000030 |
LOW |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030 https://bugs.python.org/issue31530 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030 https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view https://security.gentoo.org/glsa/201811-02 https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0 https://www.oracle.com/security-alerts/cpujan2020.html
|
python2.7 |
CVE-2018-1060 |
LOW |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1060 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1060.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307 https://www.oracle.com/security-alerts/cpujan2020.html
|
python2.7 |
CVE-2018-1061 |
LOW |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1061 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1061.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
python2.7-minimal |
CVE-2016-0772 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/9 http://www.securityfocus.com/bid/91225 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-0772 https://bugzilla.redhat.com/show_bug.cgi?id=1303647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://hg.python.org/cpython/rev/b3ce713fb9be https://hg.python.org/cpython/rev/d590114c2394 https://linux.oracle.com/cve/CVE-2016-0772.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
python2.7-minimal |
CVE-2016-1000110 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2016-1000110 https://bugs.python.org/issue27568 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110 https://linux.oracle.com/cve/CVE-2016-1000110.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/ https://security-tracker.debian.org/tracker/CVE-2016-1000110 https://ubuntu.com/security/notices/USN-3134-1
|
python2.7-minimal |
CVE-2016-5636 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-2586.html http://www.openwall.com/lists/oss-security/2016/06/15/15 http://www.openwall.com/lists/oss-security/2016/06/16/1 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91247 http://www.securitytracker.com/id/1038138 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5636 https://bugs.python.org/issue26171 https://bugs.python.org/msg278228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://linux.oracle.com/cve/CVE-2016-5636.html https://linux.oracle.com/errata/ELSA-2016-2586.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
python2.7-minimal |
CVE-2016-5699 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.3 |
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/7 http://www.openwall.com/lists/oss-security/2016/06/15/12 http://www.openwall.com/lists/oss-security/2016/06/16/2 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91226 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5699 https://bugs.python.org/issue22928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4 https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS https://hg.python.org/cpython/rev/1c45047c5102 https://hg.python.org/cpython/rev/bf3e1c9b80e9 https://linux.oracle.com/cve/CVE-2016-5699.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://ubuntu.com/security/notices/USN-3134-1
|
python2.7-minimal |
CVE-2017-1000158 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.4 |
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html http://www.securitytracker.com/id/1039890 https://access.redhat.com/security/cve/CVE-2017-1000158 https://bugs.python.org/issue30657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158 https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://security.gentoo.org/glsa/201805-02 https://ubuntu.com/security/notices/USN-3496-1 https://ubuntu.com/security/notices/USN-3496-2 https://ubuntu.com/security/notices/USN-3496-3 https://www.debian.org/security/2018/dsa-4307
|
python2.7-minimal |
CVE-2018-1000802 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2018-1000802 https://bugs.python.org/issue34540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802 https://github.com/python/cpython/pull/8985 https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306
|
python2.7-minimal |
CVE-2018-14647 |
MEDIUM |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securityfocus.com/bid/105396 http://www.securitytracker.com/id/1041740 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:2030 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-14647 https://bugs.python.org/issue34623 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647 https://linux.oracle.com/cve/CVE-2018-14647.html https://linux.oracle.com/errata/ELSA-2019-2030.html https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/ https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
python2.7-minimal |
CVE-2018-1000030 |
LOW |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030 https://bugs.python.org/issue31530 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030 https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view https://security.gentoo.org/glsa/201811-02 https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0 https://www.oracle.com/security-alerts/cpujan2020.html
|
python2.7-minimal |
CVE-2018-1060 |
LOW |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1060 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1060.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307 https://www.oracle.com/security-alerts/cpujan2020.html
|
python2.7-minimal |
CVE-2018-1061 |
LOW |
2.7.6-8ubuntu0.2 |
2.7.6-8ubuntu0.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1061 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1061.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
python3.4 |
CVE-2016-0772 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/9 http://www.securityfocus.com/bid/91225 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-0772 https://bugzilla.redhat.com/show_bug.cgi?id=1303647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://hg.python.org/cpython/rev/b3ce713fb9be https://hg.python.org/cpython/rev/d590114c2394 https://linux.oracle.com/cve/CVE-2016-0772.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
python3.4 |
CVE-2016-1000110 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2016-1000110 https://bugs.python.org/issue27568 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110 https://linux.oracle.com/cve/CVE-2016-1000110.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/ https://security-tracker.debian.org/tracker/CVE-2016-1000110 https://ubuntu.com/security/notices/USN-3134-1
|
python3.4 |
CVE-2016-5636 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-2586.html http://www.openwall.com/lists/oss-security/2016/06/15/15 http://www.openwall.com/lists/oss-security/2016/06/16/1 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91247 http://www.securitytracker.com/id/1038138 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5636 https://bugs.python.org/issue26171 https://bugs.python.org/msg278228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://linux.oracle.com/cve/CVE-2016-5636.html https://linux.oracle.com/errata/ELSA-2016-2586.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
python3.4 |
CVE-2016-5699 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/7 http://www.openwall.com/lists/oss-security/2016/06/15/12 http://www.openwall.com/lists/oss-security/2016/06/16/2 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91226 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5699 https://bugs.python.org/issue22928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4 https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS https://hg.python.org/cpython/rev/1c45047c5102 https://hg.python.org/cpython/rev/bf3e1c9b80e9 https://linux.oracle.com/cve/CVE-2016-5699.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://ubuntu.com/security/notices/USN-3134-1
|
python3.4 |
CVE-2017-1000158 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.6 |
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html http://www.securitytracker.com/id/1039890 https://access.redhat.com/security/cve/CVE-2017-1000158 https://bugs.python.org/issue30657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158 https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://security.gentoo.org/glsa/201805-02 https://ubuntu.com/security/notices/USN-3496-1 https://ubuntu.com/security/notices/USN-3496-2 https://ubuntu.com/security/notices/USN-3496-3 https://www.debian.org/security/2018/dsa-4307
|
python3.4 |
CVE-2018-1000802 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2018-1000802 https://bugs.python.org/issue34540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802 https://github.com/python/cpython/pull/8985 https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306
|
python3.4 |
CVE-2018-14647 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securityfocus.com/bid/105396 http://www.securitytracker.com/id/1041740 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:2030 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-14647 https://bugs.python.org/issue34623 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647 https://linux.oracle.com/cve/CVE-2018-14647.html https://linux.oracle.com/errata/ELSA-2019-2030.html https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/ https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
python3.4 |
CVE-2018-1060 |
LOW |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1060 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1060.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307 https://www.oracle.com/security-alerts/cpujan2020.html
|
python3.4 |
CVE-2018-1061 |
LOW |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1061 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1061.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
python3.4-minimal |
CVE-2016-0772 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/9 http://www.securityfocus.com/bid/91225 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-0772 https://bugzilla.redhat.com/show_bug.cgi?id=1303647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://hg.python.org/cpython/rev/b3ce713fb9be https://hg.python.org/cpython/rev/d590114c2394 https://linux.oracle.com/cve/CVE-2016-0772.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
python3.4-minimal |
CVE-2016-1000110 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2016-1000110 https://bugs.python.org/issue27568 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110 https://linux.oracle.com/cve/CVE-2016-1000110.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/ https://security-tracker.debian.org/tracker/CVE-2016-1000110 https://ubuntu.com/security/notices/USN-3134-1
|
python3.4-minimal |
CVE-2016-5636 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-2586.html http://www.openwall.com/lists/oss-security/2016/06/15/15 http://www.openwall.com/lists/oss-security/2016/06/16/1 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91247 http://www.securitytracker.com/id/1038138 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5636 https://bugs.python.org/issue26171 https://bugs.python.org/msg278228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2 https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS https://linux.oracle.com/cve/CVE-2016-5636.html https://linux.oracle.com/errata/ELSA-2016-2586.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://security.gentoo.org/glsa/201701-18 https://ubuntu.com/security/notices/USN-3134-1
|
python3.4-minimal |
CVE-2016-5699 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.5 |
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://rhn.redhat.com/errata/RHSA-2016-1626.html http://rhn.redhat.com/errata/RHSA-2016-1627.html http://rhn.redhat.com/errata/RHSA-2016-1628.html http://rhn.redhat.com/errata/RHSA-2016-1629.html http://rhn.redhat.com/errata/RHSA-2016-1630.html http://www.openwall.com/lists/oss-security/2016/06/14/7 http://www.openwall.com/lists/oss-security/2016/06/15/12 http://www.openwall.com/lists/oss-security/2016/06/16/2 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91226 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE https://access.redhat.com/security/cve/CVE-2016-5699 https://bugs.python.org/issue22928 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699 https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4 https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS https://hg.python.org/cpython/rev/1c45047c5102 https://hg.python.org/cpython/rev/bf3e1c9b80e9 https://linux.oracle.com/cve/CVE-2016-5699.html https://linux.oracle.com/errata/ELSA-2016-1626.html https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html https://ubuntu.com/security/notices/USN-3134-1
|
python3.4-minimal |
CVE-2017-1000158 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.6 |
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html http://www.securitytracker.com/id/1039890 https://access.redhat.com/security/cve/CVE-2017-1000158 https://bugs.python.org/issue30657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158 https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://security.gentoo.org/glsa/201805-02 https://ubuntu.com/security/notices/USN-3496-1 https://ubuntu.com/security/notices/USN-3496-2 https://ubuntu.com/security/notices/USN-3496-3 https://www.debian.org/security/2018/dsa-4307
|
python3.4-minimal |
CVE-2018-1000802 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2018-1000802 https://bugs.python.org/issue34540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802 https://github.com/python/cpython/pull/8985 https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306
|
python3.4-minimal |
CVE-2018-14647 |
MEDIUM |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securityfocus.com/bid/105396 http://www.securitytracker.com/id/1041740 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:2030 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-14647 https://bugs.python.org/issue34623 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647 https://linux.oracle.com/cve/CVE-2018-14647.html https://linux.oracle.com/errata/ELSA-2019-2030.html https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/ https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
python3.4-minimal |
CVE-2018-1060 |
LOW |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1060 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1060.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307 https://www.oracle.com/security-alerts/cpujan2020.html
|
python3.4-minimal |
CVE-2018-1061 |
LOW |
3.4.3-1ubuntu1~14.04.3 |
3.4.3-1ubuntu1~14.04.7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://www.securitytracker.com/id/1042001 https://access.redhat.com/errata/RHBA-2019:0327 https://access.redhat.com/errata/RHSA-2018:3041 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2019:1260 https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/security/cve/CVE-2018-1061 https://bugs.python.org/issue32981 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061 https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 https://linux.oracle.com/cve/CVE-2018-1061.html https://linux.oracle.com/errata/ELSA-2018-3041.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.debian.org/security/2018/dsa-4306 https://www.debian.org/security/2018/dsa-4307
|
rsync |
CVE-2017-17433 |
MEDIUM |
3.1.0-2ubuntu0.2 |
3.1.0-2ubuntu0.3 |
Expand...http://security.cucumberlinux.com/security/details.php?id=169 https://access.redhat.com/security/cve/CVE-2017-17433 https://bugzilla.redhat.com/show_bug.cgi?id=1522874#c4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17433 https://git.samba.org/?p=rsync.git;a=commit;h=3e06d40029cfdce9d0f73d87cfd4edaf54be9c51 https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html https://ubuntu.com/security/notices/USN-3506-1 https://ubuntu.com/security/notices/USN-3506-2 https://www.debian.org/security/2017/dsa-4068
|
rsync |
CVE-2017-17434 |
MEDIUM |
3.1.0-2ubuntu0.2 |
3.1.0-2ubuntu0.3 |
Expand...http://security.cucumberlinux.com/security/details.php?id=170 https://access.redhat.com/security/cve/CVE-2017-17434 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17434 https://git.samba.org/?p=rsync.git;a=commit;h=5509597decdbd7b91994210f700329d8a35e70a1 https://git.samba.org/?p=rsync.git;a=commit;h=70aeb5fddd1b2f8e143276f8d5a085db16c593b9 https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html https://ubuntu.com/security/notices/USN-3506-1 https://ubuntu.com/security/notices/USN-3506-2 https://www.debian.org/security/2017/dsa-4068
|
rsync |
CVE-2018-5764 |
MEDIUM |
3.1.0-2ubuntu0.2 |
3.1.0-2ubuntu0.4 |
Expand...http://www.securityfocus.com/bid/102803 http://www.securitytracker.com/id/1040276 https://access.redhat.com/security/cve/CVE-2018-5764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5764 https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=7706303828fcde524222babb2833864a4bd09e07 https://lists.debian.org/debian-lts-announce/2018/01/msg00021.html https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html https://lists.debian.org/debian-lts-announce/2021/11/msg00028.html https://security.gentoo.org/glsa/201805-04 https://ubuntu.com/security/notices/USN-3543-1 https://ubuntu.com/security/notices/USN-3543-2 https://usn.ubuntu.com/3543-1/
|
rsync |
CVE-2017-16548 |
LOW |
3.1.0-2ubuntu0.2 |
3.1.0-2ubuntu0.4 |
Expand...https://access.redhat.com/security/cve/CVE-2017-16548 https://bugzilla.samba.org/show_bug.cgi?id=13112 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548 https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1 https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html https://ubuntu.com/security/notices/USN-3543-1 https://ubuntu.com/security/notices/USN-3543-2 https://usn.ubuntu.com/3543-1/ https://usn.ubuntu.com/3543-2/ https://www.debian.org/security/2017/dsa-4068
|
sensible-utils |
CVE-2017-17512 |
MEDIUM |
0.0.9 |
0.0.9ubuntu0.14.04.1 |
Expand...http://metadata.ftp-master.debian.org/changelogs/main/s/sensible-utils/sensible-utils_0.0.11_changelog https://bugs.debian.org/881767 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17512 https://lists.debian.org/debian-lts-announce/2017/12/msg00012.html https://ubuntu.com/security/notices/USN-3584-1 https://usn.ubuntu.com/3584-1/ https://www.debian.org/security/2017/dsa-4071
|
sudo |
CVE-2017-1000367 |
HIGH |
1.8.9p5-1ubuntu1.2 |
1.8.9p5-1ubuntu1.4 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00077.html http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00079.html http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html http://seclists.org/fulldisclosure/2017/Jun/3 http://www.debian.org/security/2017/dsa-3867 http://www.openwall.com/lists/oss-security/2017/05/30/16 http://www.securityfocus.com/bid/98745 http://www.securitytracker.com/id/1038582 http://www.ubuntu.com/usn/USN-3304-1 https://access.redhat.com/errata/RHSA-2017:1381 https://access.redhat.com/errata/RHSA-2017:1382 https://access.redhat.com/security/cve/CVE-2017-1000367 https://access.redhat.com/security/vulnerabilities/3059071 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367 https://linux.oracle.com/cve/CVE-2017-1000367.html https://linux.oracle.com/errata/ELSA-2017-1382.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEXC4NNIG2QOZY6N2YUK246KI3D3UQO/ https://security.gentoo.org/glsa/201705-15 https://ubuntu.com/security/notices/USN-3304-1 https://www.exploit-db.com/exploits/42183/ https://www.sudo.ws/alerts/linux_tty.html
|
supervisor |
CVE-2017-11610 |
MEDIUM |
3.0b2-1 |
3.0b2-1ubuntu0.1 |
Expand...http://www.debian.org/security/2017/dsa-3942 https://access.redhat.com/errata/RHSA-2017:3005 https://access.redhat.com/security/cve/CVE-2017-11610 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11610 https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt https://github.com/Supervisor/supervisor/issues/964 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/ https://security.gentoo.org/glsa/201709-06 https://www.exploit-db.com/exploits/42779/
|
tar |
CVE-2016-6321 |
MEDIUM |
1.27.1-1 |
1.27.1-1ubuntu0.1 |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=7340f67b9860ea0531c1450e5aa261c50f67165d http://lists.gnu.org/archive/html/bug-tar/2016-10/msg00016.html http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html http://seclists.org/fulldisclosure/2016/Oct/102 http://seclists.org/fulldisclosure/2016/Oct/96 http://www.debian.org/security/2016/dsa-3702 http://www.securityfocus.com/bid/93937 http://www.ubuntu.com/usn/USN-3132-1 https://access.redhat.com/security/cve/CVE-2016-6321 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201611-19 https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt https://sintonen.fi/advisories/tar-extract-pathname-bypass.txt https://ubuntu.com/security/notices/USN-3132-1
|
udev |
CVE-2018-1049 |
MEDIUM |
204-5ubuntu20.15 |
204-5ubuntu20.26 |
Expand...http://www.securitytracker.com/id/1041520 https://access.redhat.com/errata/RHSA-2018:0260 https://access.redhat.com/security/cve/CVE-2018-1049 https://bugzilla.redhat.com/show_bug.cgi?id=1534701 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049 https://github.com/systemd/systemd/pull/5916 https://linux.oracle.com/cve/CVE-2018-1049.html https://linux.oracle.com/errata/ELSA-2018-0260.html https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html https://ubuntu.com/security/notices/USN-3558-1 https://usn.ubuntu.com/3558-1/
|
udev |
CVE-2019-3842 |
MEDIUM |
204-5ubuntu20.15 |
204-5ubuntu20.31 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html https://access.redhat.com/security/cve/CVE-2019-3842 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842 https://linux.oracle.com/cve/CVE-2019-3842.html https://linux.oracle.com/errata/ELSA-2021-1611.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/ https://nvd.nist.gov/vuln/detail/CVE-2019-3842 https://ubuntu.com/security/notices/USN-3938-1 https://www.exploit-db.com/exploits/46743/
|
vim-common |
CVE-2016-1248 |
MEDIUM |
2:7.4.052-1ubuntu3 |
2:7.4.052-1ubuntu3.1 |
Expand...http://openwall.com/lists/oss-security/2016/11/22/20 http://rhn.redhat.com/errata/RHSA-2016-2972.html http://www.debian.org/security/2016/dsa-3722 http://www.securityfocus.com/bid/94478 http://www.securitytracker.com/id/1037338 http://www.ubuntu.com/usn/USN-3139-1 https://access.redhat.com/security/cve/CVE-2016-1248 https://anonscm.debian.org/cgit/pkg-vim/vim.git/tree/debian/changelog https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1248 https://github.com/neovim/neovim/commit/4fad66fbe637818b6b3d6bc5d21923ba72795040 https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a https://github.com/vim/vim/releases/tag/v8.0.0056 https://linux.oracle.com/cve/CVE-2016-1248.html https://linux.oracle.com/errata/ELSA-2016-2972.html https://lists.debian.org/debian-lts-announce/2016/11/msg00025.html https://lists.debian.org/debian-security-announce/2016/msg00305.html https://security.gentoo.org/glsa/201701-29 https://ubuntu.com/security/notices/USN-3139-1
|
vim-tiny |
CVE-2016-1248 |
MEDIUM |
2:7.4.052-1ubuntu3 |
2:7.4.052-1ubuntu3.1 |
Expand...http://openwall.com/lists/oss-security/2016/11/22/20 http://rhn.redhat.com/errata/RHSA-2016-2972.html http://www.debian.org/security/2016/dsa-3722 http://www.securityfocus.com/bid/94478 http://www.securitytracker.com/id/1037338 http://www.ubuntu.com/usn/USN-3139-1 https://access.redhat.com/security/cve/CVE-2016-1248 https://anonscm.debian.org/cgit/pkg-vim/vim.git/tree/debian/changelog https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1248 https://github.com/neovim/neovim/commit/4fad66fbe637818b6b3d6bc5d21923ba72795040 https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a https://github.com/vim/vim/releases/tag/v8.0.0056 https://linux.oracle.com/cve/CVE-2016-1248.html https://linux.oracle.com/errata/ELSA-2016-2972.html https://lists.debian.org/debian-lts-announce/2016/11/msg00025.html https://lists.debian.org/debian-security-announce/2016/msg00305.html https://security.gentoo.org/glsa/201701-29 https://ubuntu.com/security/notices/USN-3139-1
|