TrueChartsClone/charts/dev/bwapp/security.md

4.7 MiB
Raw Blame History

hide
toc

Security Overview

Helm-Chart

Scan Results

Chart Object: bwapp/templates/common.yaml

Type Misconfiguration ID Check Severity Explaination Links
Kubernetes Security Check KSV001 Process can elevate its own privileges MEDIUM
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.allowPrivilegeEscalation' to false
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
Kubernetes Security Check KSV003 Default capabilities not dropped LOW
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-bwapp' of Deployment 'RELEASE-NAME-bwapp' should add 'ALL' to 'securityContext.capabilities.drop'
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
Kubernetes Security Check KSV003 Default capabilities not dropped LOW
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-bwapp' should add 'ALL' to 'securityContext.capabilities.drop'
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
Kubernetes Security Check KSV011 CPU not limited LOW
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-bwapp' should set 'resources.limits.cpu'
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-bwapp' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
Kubernetes Security Check KSV013 Image tag ':latest' used LOW
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-bwapp' of Deployment 'RELEASE-NAME-bwapp' should specify an image tag
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-bwapp' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
Kubernetes Security Check KSV015 CPU requests not specified LOW
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-bwapp' should set 'resources.requests.cpu'
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
Kubernetes Security Check KSV016 Memory requests not specified LOW
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-bwapp' should set 'resources.requests.memory'
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
Kubernetes Security Check KSV017 Privileged container HIGH
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.privileged' to false
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
Kubernetes Security Check KSV018 Memory not limited LOW
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-bwapp' should set 'resources.limits.memory'
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
Kubernetes Security Check KSV020 Runs with low user ID MEDIUM
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the hosts user table.


Container 'RELEASE-NAME-bwapp' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
Kubernetes Security Check KSV020 Runs with low user ID MEDIUM
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the hosts user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
Kubernetes Security Check KSV020 Runs with low user ID MEDIUM
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the hosts user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
Kubernetes Security Check KSV021 Runs with low group ID MEDIUM
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the hosts user table.


Container 'RELEASE-NAME-bwapp' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
Kubernetes Security Check KSV021 Runs with low group ID MEDIUM
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the hosts user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
Kubernetes Security Check KSV021 Runs with low group ID MEDIUM
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the hosts user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-bwapp' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
Kubernetes Security Check KSV023 hostPath volumes mounted MEDIUM
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-bwapp' should not set 'spec.template.volumes.hostPath'
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
Kubernetes Security Check KSV029 A root primary or supplementary GID set LOW
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-bwapp' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029

Containers

Detected Containers
      tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
      tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
      tccr.io/truecharts/bwapp:latest
Scan Results

Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)

alpine

Package Vulnerability Severity Installed Version Fixed Version Links
busybox CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
curl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
ssl_client CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
zlib CVE-2018-25032 HIGH 1.2.11-r3 1.2.12-r0
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-1642.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3

Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)

alpine

Package Vulnerability Severity Installed Version Fixed Version Links
busybox CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
curl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
ssl_client CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
zlib CVE-2018-25032 HIGH 1.2.11-r3 1.2.12-r0
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-1642.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3

Container: tccr.io/truecharts/bwapp:latest (ubuntu 14.04)

ubuntu

Package Vulnerability Severity Installed Version Fixed Version Links
apache2 CVE-2016-0736 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.14
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://www.debian.org/security/2017/dsa-3796
http://www.securityfocus.com/bid/95078
http://www.securitytracker.com/id/1037508
https://access.redhat.com/errata/RHSA-2017:0906
https://access.redhat.com/errata/RHSA-2017:1161
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/security/cve/CVE-2016-0736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-0736
https://linux.oracle.com/cve/CVE-2016-0736.html
https://linux.oracle.com/errata/ELSA-2017-0906.html
https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201701-36
https://security.netapp.com/advisory/ntap-20180423-0001/
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3279-1
https://www.exploit-db.com/exploits/40961/
https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt
https://www.tenable.com/security/tns-2017-04
apache2 CVE-2016-5387 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.13
Expand...http://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html
http://rhn.redhat.com/errata/RHSA-2016-1624.html
http://rhn.redhat.com/errata/RHSA-2016-1625.html
http://rhn.redhat.com/errata/RHSA-2016-1648.html
http://rhn.redhat.com/errata/RHSA-2016-1649.html
http://rhn.redhat.com/errata/RHSA-2016-1650.html
http://www.debian.org/security/2016/dsa-3623
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91816
http://www.securitytracker.com/id/1036330
http://www.ubuntu.com/usn/USN-3038-1
https://access.redhat.com/errata/RHSA-2016:1420
https://access.redhat.com/errata/RHSA-2016:1421
https://access.redhat.com/errata/RHSA-2016:1422
https://access.redhat.com/errata/RHSA-2016:1635
https://access.redhat.com/errata/RHSA-2016:1636
https://access.redhat.com/errata/RHSA-2016:1851
https://access.redhat.com/security/cve/CVE-2016-5387
https://access.redhat.com/security/vulnerabilities/httpoxy
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5387.html
https://linux.oracle.com/errata/ELSA-2016-1422.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6WCTE7443AYZ4EGELWLVNANA2WJCJIYI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEKZAB7MTWVSMORHTEMCQNFFMIHCYF76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPQAPWQA774JPDRV4UIB2SZAX6D3UZCV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TGNHXJJSWDXAOEYH5TMXDPQVJMQQJOAZ/
https://security.gentoo.org/glsa/201701-36
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3038-1
https://www.apache.org/security/asf-httpoxy-response.txt
https://www.tenable.com/security/tns-2017-04
apache2 CVE-2016-8743 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.14
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://www.debian.org/security/2017/dsa-3796
http://www.securityfocus.com/bid/95077
http://www.securitytracker.com/id/1037508
https://access.redhat.com/errata/RHSA-2017:0906
https://access.redhat.com/errata/RHSA-2017:1161
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1721
https://access.redhat.com/security/cve/CVE-2016-8743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03753en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743
https://linux.oracle.com/cve/CVE-2016-8743.html
https://linux.oracle.com/errata/ELSA-2017-1721.html
https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201701-36
https://security.netapp.com/advisory/ntap-20180423-0001/
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3279-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.tenable.com/security/tns-2017-04
apache2 CVE-2017-3167 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.16
Expand...http://www.debian.org/security/2017/dsa-3896
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99135
http://www.securitytracker.com/id/1038711
https://access.redhat.com/errata/RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://access.redhat.com/security/cve/CVE-2017-3167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-3167.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8409e41a8f7dd9ded37141c38df001be930115428c3d64f70bbdb8b4@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3340-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.nomachine.com/SU08O00185
https://www.tenable.com/security/tns-2019-09
apache2 CVE-2017-3169 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.16
Expand...http://www.debian.org/security/2017/dsa-3896
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99134
http://www.securitytracker.com/id/1038711
https://access.redhat.com/errata/RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://access.redhat.com/security/cve/CVE-2017-3169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
https://github.com/gottburgm/Exploits/tree/master/CVE-2017-3169
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-3169.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84bf7fcc5cad35d355f11839cbdd13cbc5ffc1d34675090bff0f96ae@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3340-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.nomachine.com/SU08O00185
https://www.tenable.com/security/tns-2019-09
apache2 CVE-2017-7668 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.16
Expand...http://www.debian.org/security/2017/dsa-3896
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99137
http://www.securitytracker.com/id/1038711
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/security/cve/CVE-2017-7668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-7668.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3340-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.tenable.com/security/tns-2019-09
apache2 CVE-2017-9788 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.17
Expand...http://www.debian.org/security/2017/dsa-3913
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99569
http://www.securitytracker.com/id/1038906
https://access.redhat.com/errata/RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/security/cve/CVE-2017-9788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27
https://linux.oracle.com/cve/CVE-2017-9788.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20170911-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3370-1
https://ubuntu.com/security/notices/USN-3370-2
https://www.tenable.com/security/tns-2019-09
apache2 CVE-2017-9798 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.18
Expand...http://openwall.com/lists/oss-security/2017/09/18/2
http://www.debian.org/security/2017/dsa-3980
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/100872
http://www.securityfocus.com/bid/105598
http://www.securitytracker.com/id/1039387
https://access.redhat.com/errata/RHSA-2017:2882
https://access.redhat.com/errata/RHSA-2017:2972
https://access.redhat.com/errata/RHSA-2017:3018
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://access.redhat.com/security/cve/CVE-2017-9798
https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html
https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798
https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a
https://github.com/hannob/optionsbleed
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798
https://linux.oracle.com/cve/CVE-2017-9798.html
https://linux.oracle.com/errata/ELSA-2017-2972.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2017-9798
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0003/
https://support.apple.com/HT208331
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch
https://ubuntu.com/security/notices/USN-3425-1
https://ubuntu.com/security/notices/USN-3425-2
https://www.exploit-db.com/exploits/42745/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.tenable.com/security/tns-2019-09
apache2 CVE-2019-0217 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.22
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
http://www.apache.org/dist/httpd/CHANGES_2.4
http://www.openwall.com/lists/oss-security/2019/04/02/5
http://www.securityfocus.com/bid/107668
https://access.redhat.com/errata/RHSA-2019:2343
https://access.redhat.com/errata/RHSA-2019:3436
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/errata/RHSA-2019:4126
https://access.redhat.com/security/cve/CVE-2019-0217
https://bugzilla.redhat.com/show_bug.cgi?id=1695020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0217
https://linux.oracle.com/cve/CVE-2019-0217.html
https://linux.oracle.com/errata/ELSA-2019-3436.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
https://seclists.org/bugtraq/2019/Apr/5
https://security.netapp.com/advisory/ntap-20190423-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
https://ubuntu.com/security/notices/USN-3937-1
https://ubuntu.com/security/notices/USN-3937-2
https://usn.ubuntu.com/3937-1/
https://usn.ubuntu.com/3937-2/
https://www.debian.org/security/2019/dsa-4422
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
apache2 CVE-2016-2161 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.14
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://www.debian.org/security/2017/dsa-3796
http://www.securityfocus.com/bid/95076
http://www.securitytracker.com/id/1037508
https://access.redhat.com/errata/RHSA-2017:0906
https://access.redhat.com/errata/RHSA-2017:1161
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/security/cve/CVE-2016-2161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161
https://linux.oracle.com/cve/CVE-2016-2161.html
https://linux.oracle.com/errata/ELSA-2017-0906.html
https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201701-36
https://security.netapp.com/advisory/ntap-20180423-0001/
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3279-1
https://www.tenable.com/security/tns-2017-04
apache2 CVE-2016-4975 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.14
Expand...http://www.securityfocus.com/bid/105093
https://access.redhat.com/security/cve/CVE-2016-4975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975
https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://security.netapp.com/advisory/ntap-20180926-0006/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3279-1
apache2 CVE-2017-15710 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/8
http://www.securityfocus.com/bid/103512
http://www.securitytracker.com/id/1040569
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2017-15710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-15710.html
https://linux.oracle.com/errata/ELSA-2020-1121.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://ubuntu.com/security/notices/USN-3937-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://usn.ubuntu.com/3937-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2 CVE-2017-15715 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/6
http://www.securityfocus.com/bid/103525
http://www.securitytracker.com/id/1040570
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2017-15715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-15715.html
https://linux.oracle.com/errata/ELSA-2020-3958.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2 CVE-2017-7679 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.16
Expand...http://www.debian.org/security/2017/dsa-3896
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99170
http://www.securitytracker.com/id/1038711
https://access.redhat.com/errata/RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://access.redhat.com/security/cve/CVE-2017-7679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
https://github.com/gottburgm/Exploits/tree/master/CVE-2017-7679
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-7679.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f4515e580dfb6eeca589a5cdebd4c4c709ce632b12924f343c3b7751@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3340-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.nomachine.com/SU08O00185
https://www.tenable.com/security/tns-2019-09
apache2 CVE-2018-1283 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/4
http://www.securityfocus.com/bid/103520
http://www.securitytracker.com/id/1040568
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2018-1283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-1283.html
https://linux.oracle.com/errata/ELSA-2020-3958.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2 CVE-2018-1301 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/2
http://www.securityfocus.com/bid/103515
http://www.securitytracker.com/id/1040573
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2018-1301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-1301.html
https://linux.oracle.com/errata/ELSA-2020-1121.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://ubuntu.com/security/notices/USN-3937-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://usn.ubuntu.com/3937-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2 CVE-2018-1303 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/3
http://www.securityfocus.com/bid/103522
http://www.securitytracker.com/id/1040572
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2018-1303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-1303.html
https://linux.oracle.com/errata/ELSA-2020-3958.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2 CVE-2018-1312 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/7
http://www.securityfocus.com/bid/103524
http://www.securitytracker.com/id/1040571
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/errata/RHSA-2019:1898
https://access.redhat.com/security/cve/CVE-2018-1312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-1312.html
https://linux.oracle.com/errata/ELSA-2019-1898.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://ubuntu.com/security/notices/USN-3937-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://usn.ubuntu.com/3937-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2 CVE-2018-17199 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/106742
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/errata/RHSA-2019:4126
https://access.redhat.com/security/cve/CVE-2018-17199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-17199.html
https://linux.oracle.com/errata/ELSA-2021-1809.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html
https://seclists.org/bugtraq/2019/Apr/5
https://security.gentoo.org/glsa/201903-21
https://security.netapp.com/advisory/ntap-20190125-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
https://ubuntu.com/security/notices/USN-3937-1
https://usn.ubuntu.com/3937-1/
https://www.debian.org/security/2019/dsa-4422
https://www.openwall.com/lists/oss-security/2019/01/22/3
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2019-09
apache2 CVE-2019-0220 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.22
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
http://www.apache.org/dist/httpd/CHANGES_2.4
http://www.openwall.com/lists/oss-security/2019/04/02/6
http://www.securityfocus.com/bid/107670
https://access.redhat.com/errata/RHSA-2019:2343
https://access.redhat.com/errata/RHSA-2019:3436
https://access.redhat.com/errata/RHSA-2019:4126
https://access.redhat.com/errata/RHSA-2020:0250
https://access.redhat.com/errata/RHSA-2020:0251
https://access.redhat.com/security/cve/CVE-2019-0220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0220
https://linux.oracle.com/cve/CVE-2019-0220.html
https://linux.oracle.com/errata/ELSA-2019-3436.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r31f46d1f16ffcafa68058596b21f6eaf6d352290e522690a1cdccdd7@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
https://seclists.org/bugtraq/2019/Apr/5
https://security.netapp.com/advisory/ntap-20190625-0007/
https://support.f5.com/csp/article/K44591505
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
https://ubuntu.com/security/notices/USN-3937-1
https://usn.ubuntu.com/3937-1/
https://www.debian.org/security/2019/dsa-4422
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
apache2-bin CVE-2016-0736 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.14
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://www.debian.org/security/2017/dsa-3796
http://www.securityfocus.com/bid/95078
http://www.securitytracker.com/id/1037508
https://access.redhat.com/errata/RHSA-2017:0906
https://access.redhat.com/errata/RHSA-2017:1161
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/security/cve/CVE-2016-0736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-0736
https://linux.oracle.com/cve/CVE-2016-0736.html
https://linux.oracle.com/errata/ELSA-2017-0906.html
https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201701-36
https://security.netapp.com/advisory/ntap-20180423-0001/
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3279-1
https://www.exploit-db.com/exploits/40961/
https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt
https://www.tenable.com/security/tns-2017-04
apache2-bin CVE-2016-5387 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.13
Expand...http://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html
http://rhn.redhat.com/errata/RHSA-2016-1624.html
http://rhn.redhat.com/errata/RHSA-2016-1625.html
http://rhn.redhat.com/errata/RHSA-2016-1648.html
http://rhn.redhat.com/errata/RHSA-2016-1649.html
http://rhn.redhat.com/errata/RHSA-2016-1650.html
http://www.debian.org/security/2016/dsa-3623
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91816
http://www.securitytracker.com/id/1036330
http://www.ubuntu.com/usn/USN-3038-1
https://access.redhat.com/errata/RHSA-2016:1420
https://access.redhat.com/errata/RHSA-2016:1421
https://access.redhat.com/errata/RHSA-2016:1422
https://access.redhat.com/errata/RHSA-2016:1635
https://access.redhat.com/errata/RHSA-2016:1636
https://access.redhat.com/errata/RHSA-2016:1851
https://access.redhat.com/security/cve/CVE-2016-5387
https://access.redhat.com/security/vulnerabilities/httpoxy
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5387.html
https://linux.oracle.com/errata/ELSA-2016-1422.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6WCTE7443AYZ4EGELWLVNANA2WJCJIYI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEKZAB7MTWVSMORHTEMCQNFFMIHCYF76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPQAPWQA774JPDRV4UIB2SZAX6D3UZCV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TGNHXJJSWDXAOEYH5TMXDPQVJMQQJOAZ/
https://security.gentoo.org/glsa/201701-36
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3038-1
https://www.apache.org/security/asf-httpoxy-response.txt
https://www.tenable.com/security/tns-2017-04
apache2-bin CVE-2016-8743 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.14
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://www.debian.org/security/2017/dsa-3796
http://www.securityfocus.com/bid/95077
http://www.securitytracker.com/id/1037508
https://access.redhat.com/errata/RHSA-2017:0906
https://access.redhat.com/errata/RHSA-2017:1161
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1721
https://access.redhat.com/security/cve/CVE-2016-8743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03753en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743
https://linux.oracle.com/cve/CVE-2016-8743.html
https://linux.oracle.com/errata/ELSA-2017-1721.html
https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201701-36
https://security.netapp.com/advisory/ntap-20180423-0001/
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3279-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.tenable.com/security/tns-2017-04
apache2-bin CVE-2017-3167 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.16
Expand...http://www.debian.org/security/2017/dsa-3896
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99135
http://www.securitytracker.com/id/1038711
https://access.redhat.com/errata/RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://access.redhat.com/security/cve/CVE-2017-3167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-3167.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8409e41a8f7dd9ded37141c38df001be930115428c3d64f70bbdb8b4@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3340-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.nomachine.com/SU08O00185
https://www.tenable.com/security/tns-2019-09
apache2-bin CVE-2017-3169 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.16
Expand...http://www.debian.org/security/2017/dsa-3896
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99134
http://www.securitytracker.com/id/1038711
https://access.redhat.com/errata/RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://access.redhat.com/security/cve/CVE-2017-3169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
https://github.com/gottburgm/Exploits/tree/master/CVE-2017-3169
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-3169.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84bf7fcc5cad35d355f11839cbdd13cbc5ffc1d34675090bff0f96ae@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3340-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.nomachine.com/SU08O00185
https://www.tenable.com/security/tns-2019-09
apache2-bin CVE-2017-7668 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.16
Expand...http://www.debian.org/security/2017/dsa-3896
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99137
http://www.securitytracker.com/id/1038711
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/security/cve/CVE-2017-7668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-7668.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3340-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.tenable.com/security/tns-2019-09
apache2-bin CVE-2017-9788 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.17
Expand...http://www.debian.org/security/2017/dsa-3913
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99569
http://www.securitytracker.com/id/1038906
https://access.redhat.com/errata/RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/security/cve/CVE-2017-9788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27
https://linux.oracle.com/cve/CVE-2017-9788.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20170911-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3370-1
https://ubuntu.com/security/notices/USN-3370-2
https://www.tenable.com/security/tns-2019-09
apache2-bin CVE-2017-9798 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.18
Expand...http://openwall.com/lists/oss-security/2017/09/18/2
http://www.debian.org/security/2017/dsa-3980
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/100872
http://www.securityfocus.com/bid/105598
http://www.securitytracker.com/id/1039387
https://access.redhat.com/errata/RHSA-2017:2882
https://access.redhat.com/errata/RHSA-2017:2972
https://access.redhat.com/errata/RHSA-2017:3018
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://access.redhat.com/security/cve/CVE-2017-9798
https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html
https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798
https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a
https://github.com/hannob/optionsbleed
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798
https://linux.oracle.com/cve/CVE-2017-9798.html
https://linux.oracle.com/errata/ELSA-2017-2972.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2017-9798
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0003/
https://support.apple.com/HT208331
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch
https://ubuntu.com/security/notices/USN-3425-1
https://ubuntu.com/security/notices/USN-3425-2
https://www.exploit-db.com/exploits/42745/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.tenable.com/security/tns-2019-09
apache2-bin CVE-2019-0217 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.22
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
http://www.apache.org/dist/httpd/CHANGES_2.4
http://www.openwall.com/lists/oss-security/2019/04/02/5
http://www.securityfocus.com/bid/107668
https://access.redhat.com/errata/RHSA-2019:2343
https://access.redhat.com/errata/RHSA-2019:3436
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/errata/RHSA-2019:4126
https://access.redhat.com/security/cve/CVE-2019-0217
https://bugzilla.redhat.com/show_bug.cgi?id=1695020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0217
https://linux.oracle.com/cve/CVE-2019-0217.html
https://linux.oracle.com/errata/ELSA-2019-3436.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
https://seclists.org/bugtraq/2019/Apr/5
https://security.netapp.com/advisory/ntap-20190423-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
https://ubuntu.com/security/notices/USN-3937-1
https://ubuntu.com/security/notices/USN-3937-2
https://usn.ubuntu.com/3937-1/
https://usn.ubuntu.com/3937-2/
https://www.debian.org/security/2019/dsa-4422
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
apache2-bin CVE-2016-2161 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.14
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://www.debian.org/security/2017/dsa-3796
http://www.securityfocus.com/bid/95076
http://www.securitytracker.com/id/1037508
https://access.redhat.com/errata/RHSA-2017:0906
https://access.redhat.com/errata/RHSA-2017:1161
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/security/cve/CVE-2016-2161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161
https://linux.oracle.com/cve/CVE-2016-2161.html
https://linux.oracle.com/errata/ELSA-2017-0906.html
https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201701-36
https://security.netapp.com/advisory/ntap-20180423-0001/
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3279-1
https://www.tenable.com/security/tns-2017-04
apache2-bin CVE-2016-4975 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.14
Expand...http://www.securityfocus.com/bid/105093
https://access.redhat.com/security/cve/CVE-2016-4975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975
https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://security.netapp.com/advisory/ntap-20180926-0006/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3279-1
apache2-bin CVE-2017-15710 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/8
http://www.securityfocus.com/bid/103512
http://www.securitytracker.com/id/1040569
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2017-15710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-15710.html
https://linux.oracle.com/errata/ELSA-2020-1121.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://ubuntu.com/security/notices/USN-3937-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://usn.ubuntu.com/3937-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2-bin CVE-2017-15715 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/6
http://www.securityfocus.com/bid/103525
http://www.securitytracker.com/id/1040570
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2017-15715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-15715.html
https://linux.oracle.com/errata/ELSA-2020-3958.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2-bin CVE-2017-7679 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.16
Expand...http://www.debian.org/security/2017/dsa-3896
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99170
http://www.securitytracker.com/id/1038711
https://access.redhat.com/errata/RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://access.redhat.com/security/cve/CVE-2017-7679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
https://github.com/gottburgm/Exploits/tree/master/CVE-2017-7679
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-7679.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f4515e580dfb6eeca589a5cdebd4c4c709ce632b12924f343c3b7751@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3340-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.nomachine.com/SU08O00185
https://www.tenable.com/security/tns-2019-09
apache2-bin CVE-2018-1283 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/4
http://www.securityfocus.com/bid/103520
http://www.securitytracker.com/id/1040568
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2018-1283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-1283.html
https://linux.oracle.com/errata/ELSA-2020-3958.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2-bin CVE-2018-1301 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/2
http://www.securityfocus.com/bid/103515
http://www.securitytracker.com/id/1040573
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2018-1301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-1301.html
https://linux.oracle.com/errata/ELSA-2020-1121.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://ubuntu.com/security/notices/USN-3937-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://usn.ubuntu.com/3937-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2-bin CVE-2018-1303 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/3
http://www.securityfocus.com/bid/103522
http://www.securitytracker.com/id/1040572
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2018-1303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-1303.html
https://linux.oracle.com/errata/ELSA-2020-3958.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2-bin CVE-2018-1312 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/7
http://www.securityfocus.com/bid/103524
http://www.securitytracker.com/id/1040571
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/errata/RHSA-2019:1898
https://access.redhat.com/security/cve/CVE-2018-1312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-1312.html
https://linux.oracle.com/errata/ELSA-2019-1898.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://ubuntu.com/security/notices/USN-3937-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://usn.ubuntu.com/3937-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2-bin CVE-2018-17199 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/106742
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/errata/RHSA-2019:4126
https://access.redhat.com/security/cve/CVE-2018-17199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-17199.html
https://linux.oracle.com/errata/ELSA-2021-1809.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html
https://seclists.org/bugtraq/2019/Apr/5
https://security.gentoo.org/glsa/201903-21
https://security.netapp.com/advisory/ntap-20190125-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
https://ubuntu.com/security/notices/USN-3937-1
https://usn.ubuntu.com/3937-1/
https://www.debian.org/security/2019/dsa-4422
https://www.openwall.com/lists/oss-security/2019/01/22/3
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2019-09
apache2-bin CVE-2019-0220 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.22
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
http://www.apache.org/dist/httpd/CHANGES_2.4
http://www.openwall.com/lists/oss-security/2019/04/02/6
http://www.securityfocus.com/bid/107670
https://access.redhat.com/errata/RHSA-2019:2343
https://access.redhat.com/errata/RHSA-2019:3436
https://access.redhat.com/errata/RHSA-2019:4126
https://access.redhat.com/errata/RHSA-2020:0250
https://access.redhat.com/errata/RHSA-2020:0251
https://access.redhat.com/security/cve/CVE-2019-0220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0220
https://linux.oracle.com/cve/CVE-2019-0220.html
https://linux.oracle.com/errata/ELSA-2019-3436.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r31f46d1f16ffcafa68058596b21f6eaf6d352290e522690a1cdccdd7@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
https://seclists.org/bugtraq/2019/Apr/5
https://security.netapp.com/advisory/ntap-20190625-0007/
https://support.f5.com/csp/article/K44591505
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
https://ubuntu.com/security/notices/USN-3937-1
https://usn.ubuntu.com/3937-1/
https://www.debian.org/security/2019/dsa-4422
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
apache2-data CVE-2016-0736 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.14
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://www.debian.org/security/2017/dsa-3796
http://www.securityfocus.com/bid/95078
http://www.securitytracker.com/id/1037508
https://access.redhat.com/errata/RHSA-2017:0906
https://access.redhat.com/errata/RHSA-2017:1161
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/security/cve/CVE-2016-0736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-0736
https://linux.oracle.com/cve/CVE-2016-0736.html
https://linux.oracle.com/errata/ELSA-2017-0906.html
https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201701-36
https://security.netapp.com/advisory/ntap-20180423-0001/
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3279-1
https://www.exploit-db.com/exploits/40961/
https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt
https://www.tenable.com/security/tns-2017-04
apache2-data CVE-2016-5387 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.13
Expand...http://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html
http://rhn.redhat.com/errata/RHSA-2016-1624.html
http://rhn.redhat.com/errata/RHSA-2016-1625.html
http://rhn.redhat.com/errata/RHSA-2016-1648.html
http://rhn.redhat.com/errata/RHSA-2016-1649.html
http://rhn.redhat.com/errata/RHSA-2016-1650.html
http://www.debian.org/security/2016/dsa-3623
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91816
http://www.securitytracker.com/id/1036330
http://www.ubuntu.com/usn/USN-3038-1
https://access.redhat.com/errata/RHSA-2016:1420
https://access.redhat.com/errata/RHSA-2016:1421
https://access.redhat.com/errata/RHSA-2016:1422
https://access.redhat.com/errata/RHSA-2016:1635
https://access.redhat.com/errata/RHSA-2016:1636
https://access.redhat.com/errata/RHSA-2016:1851
https://access.redhat.com/security/cve/CVE-2016-5387
https://access.redhat.com/security/vulnerabilities/httpoxy
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5387.html
https://linux.oracle.com/errata/ELSA-2016-1422.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6WCTE7443AYZ4EGELWLVNANA2WJCJIYI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEKZAB7MTWVSMORHTEMCQNFFMIHCYF76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPQAPWQA774JPDRV4UIB2SZAX6D3UZCV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TGNHXJJSWDXAOEYH5TMXDPQVJMQQJOAZ/
https://security.gentoo.org/glsa/201701-36
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3038-1
https://www.apache.org/security/asf-httpoxy-response.txt
https://www.tenable.com/security/tns-2017-04
apache2-data CVE-2016-8743 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.14
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://www.debian.org/security/2017/dsa-3796
http://www.securityfocus.com/bid/95077
http://www.securitytracker.com/id/1037508
https://access.redhat.com/errata/RHSA-2017:0906
https://access.redhat.com/errata/RHSA-2017:1161
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1721
https://access.redhat.com/security/cve/CVE-2016-8743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03753en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743
https://linux.oracle.com/cve/CVE-2016-8743.html
https://linux.oracle.com/errata/ELSA-2017-1721.html
https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201701-36
https://security.netapp.com/advisory/ntap-20180423-0001/
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3279-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.tenable.com/security/tns-2017-04
apache2-data CVE-2017-3167 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.16
Expand...http://www.debian.org/security/2017/dsa-3896
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99135
http://www.securitytracker.com/id/1038711
https://access.redhat.com/errata/RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://access.redhat.com/security/cve/CVE-2017-3167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-3167.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8409e41a8f7dd9ded37141c38df001be930115428c3d64f70bbdb8b4@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3340-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.nomachine.com/SU08O00185
https://www.tenable.com/security/tns-2019-09
apache2-data CVE-2017-3169 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.16
Expand...http://www.debian.org/security/2017/dsa-3896
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99134
http://www.securitytracker.com/id/1038711
https://access.redhat.com/errata/RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://access.redhat.com/security/cve/CVE-2017-3169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
https://github.com/gottburgm/Exploits/tree/master/CVE-2017-3169
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-3169.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84bf7fcc5cad35d355f11839cbdd13cbc5ffc1d34675090bff0f96ae@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3340-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.nomachine.com/SU08O00185
https://www.tenable.com/security/tns-2019-09
apache2-data CVE-2017-7668 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.16
Expand...http://www.debian.org/security/2017/dsa-3896
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99137
http://www.securitytracker.com/id/1038711
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/security/cve/CVE-2017-7668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-7668.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/55a068b6a5eec0b3198ae7d96a7cb412352d0ffa7716612c5af3745b@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3340-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.tenable.com/security/tns-2019-09
apache2-data CVE-2017-9788 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.17
Expand...http://www.debian.org/security/2017/dsa-3913
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99569
http://www.securitytracker.com/id/1038906
https://access.redhat.com/errata/RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/security/cve/CVE-2017-9788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27
https://linux.oracle.com/cve/CVE-2017-9788.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20170911-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3370-1
https://ubuntu.com/security/notices/USN-3370-2
https://www.tenable.com/security/tns-2019-09
apache2-data CVE-2017-9798 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.18
Expand...http://openwall.com/lists/oss-security/2017/09/18/2
http://www.debian.org/security/2017/dsa-3980
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/100872
http://www.securityfocus.com/bid/105598
http://www.securitytracker.com/id/1039387
https://access.redhat.com/errata/RHSA-2017:2882
https://access.redhat.com/errata/RHSA-2017:2972
https://access.redhat.com/errata/RHSA-2017:3018
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://access.redhat.com/security/cve/CVE-2017-9798
https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html
https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798
https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a
https://github.com/hannob/optionsbleed
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798
https://linux.oracle.com/cve/CVE-2017-9798.html
https://linux.oracle.com/errata/ELSA-2017-2972.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2017-9798
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0003/
https://support.apple.com/HT208331
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch
https://ubuntu.com/security/notices/USN-3425-1
https://ubuntu.com/security/notices/USN-3425-2
https://www.exploit-db.com/exploits/42745/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.tenable.com/security/tns-2019-09
apache2-data CVE-2019-0217 MEDIUM 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.22
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
http://www.apache.org/dist/httpd/CHANGES_2.4
http://www.openwall.com/lists/oss-security/2019/04/02/5
http://www.securityfocus.com/bid/107668
https://access.redhat.com/errata/RHSA-2019:2343
https://access.redhat.com/errata/RHSA-2019:3436
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/errata/RHSA-2019:4126
https://access.redhat.com/security/cve/CVE-2019-0217
https://bugzilla.redhat.com/show_bug.cgi?id=1695020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0217
https://linux.oracle.com/cve/CVE-2019-0217.html
https://linux.oracle.com/errata/ELSA-2019-3436.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
https://seclists.org/bugtraq/2019/Apr/5
https://security.netapp.com/advisory/ntap-20190423-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
https://ubuntu.com/security/notices/USN-3937-1
https://ubuntu.com/security/notices/USN-3937-2
https://usn.ubuntu.com/3937-1/
https://usn.ubuntu.com/3937-2/
https://www.debian.org/security/2019/dsa-4422
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
apache2-data CVE-2016-2161 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.14
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://www.debian.org/security/2017/dsa-3796
http://www.securityfocus.com/bid/95076
http://www.securitytracker.com/id/1037508
https://access.redhat.com/errata/RHSA-2017:0906
https://access.redhat.com/errata/RHSA-2017:1161
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/security/cve/CVE-2016-2161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161
https://linux.oracle.com/cve/CVE-2016-2161.html
https://linux.oracle.com/errata/ELSA-2017-0906.html
https://lists.apache.org/thread.html/139862b41c0dfd5e6e00ad89c00119f9faf0dd41a2f927da9c9a4076@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201701-36
https://security.netapp.com/advisory/ntap-20180423-0001/
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3279-1
https://www.tenable.com/security/tns-2017-04
apache2-data CVE-2016-4975 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.14
Expand...http://www.securityfocus.com/bid/105093
https://access.redhat.com/security/cve/CVE-2016-4975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975
https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://security.netapp.com/advisory/ntap-20180926-0006/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3279-1
apache2-data CVE-2017-15710 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/8
http://www.securityfocus.com/bid/103512
http://www.securitytracker.com/id/1040569
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2017-15710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-15710.html
https://linux.oracle.com/errata/ELSA-2020-1121.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://ubuntu.com/security/notices/USN-3937-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://usn.ubuntu.com/3937-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2-data CVE-2017-15715 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/6
http://www.securityfocus.com/bid/103525
http://www.securitytracker.com/id/1040570
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2017-15715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-15715.html
https://linux.oracle.com/errata/ELSA-2020-3958.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2-data CVE-2017-7679 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.16
Expand...http://www.debian.org/security/2017/dsa-3896
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/99170
http://www.securitytracker.com/id/1038711
https://access.redhat.com/errata/RHSA-2017:2478
https://access.redhat.com/errata/RHSA-2017:2479
https://access.redhat.com/errata/RHSA-2017:2483
https://access.redhat.com/errata/RHSA-2017:3193
https://access.redhat.com/errata/RHSA-2017:3194
https://access.redhat.com/errata/RHSA-2017:3195
https://access.redhat.com/errata/RHSA-2017:3475
https://access.redhat.com/errata/RHSA-2017:3476
https://access.redhat.com/errata/RHSA-2017:3477
https://access.redhat.com/security/cve/CVE-2017-7679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
https://github.com/gottburgm/Exploits/tree/master/CVE-2017-7679
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2017-7679.html
https://linux.oracle.com/errata/ELSA-2017-2479.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f4515e580dfb6eeca589a5cdebd4c4c709ce632b12924f343c3b7751@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.gentoo.org/glsa/201710-32
https://security.netapp.com/advisory/ntap-20180601-0002/
https://support.apple.com/HT208221
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
https://ubuntu.com/security/notices/USN-3340-1
https://ubuntu.com/security/notices/USN-3373-1
https://www.nomachine.com/SU08O00185
https://www.tenable.com/security/tns-2019-09
apache2-data CVE-2018-1283 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/4
http://www.securityfocus.com/bid/103520
http://www.securitytracker.com/id/1040568
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2018-1283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-1283.html
https://linux.oracle.com/errata/ELSA-2020-3958.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2-data CVE-2018-1301 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/2
http://www.securityfocus.com/bid/103515
http://www.securitytracker.com/id/1040573
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2018-1301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-1301.html
https://linux.oracle.com/errata/ELSA-2020-1121.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://ubuntu.com/security/notices/USN-3937-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://usn.ubuntu.com/3937-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2-data CVE-2018-1303 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/3
http://www.securityfocus.com/bid/103522
http://www.securitytracker.com/id/1040572
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/security/cve/CVE-2018-1303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-1303.html
https://linux.oracle.com/errata/ELSA-2020-3958.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2-data CVE-2018-1312 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.20
Expand...http://www.openwall.com/lists/oss-security/2018/03/24/7
http://www.securityfocus.com/bid/103524
http://www.securitytracker.com/id/1040571
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/errata/RHSA-2019:1898
https://access.redhat.com/security/cve/CVE-2018-1312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-1312.html
https://linux.oracle.com/errata/ELSA-2019-1898.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
https://security.netapp.com/advisory/ntap-20180601-0004/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
https://ubuntu.com/security/notices/USN-3627-1
https://ubuntu.com/security/notices/USN-3627-2
https://ubuntu.com/security/notices/USN-3937-2
https://usn.ubuntu.com/3627-1/
https://usn.ubuntu.com/3627-2/
https://usn.ubuntu.com/3937-2/
https://www.debian.org/security/2018/dsa-4164
https://www.tenable.com/security/tns-2019-09
apache2-data CVE-2018-17199 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/106742
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/errata/RHSA-2019:4126
https://access.redhat.com/security/cve/CVE-2018-17199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2018-17199.html
https://linux.oracle.com/errata/ELSA-2021-1809.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html
https://seclists.org/bugtraq/2019/Apr/5
https://security.gentoo.org/glsa/201903-21
https://security.netapp.com/advisory/ntap-20190125-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
https://ubuntu.com/security/notices/USN-3937-1
https://usn.ubuntu.com/3937-1/
https://www.debian.org/security/2019/dsa-4422
https://www.openwall.com/lists/oss-security/2019/01/22/3
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2019-09
apache2-data CVE-2019-0220 LOW 2.4.7-1ubuntu4.9 2.4.7-1ubuntu4.22
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
http://www.apache.org/dist/httpd/CHANGES_2.4
http://www.openwall.com/lists/oss-security/2019/04/02/6
http://www.securityfocus.com/bid/107670
https://access.redhat.com/errata/RHSA-2019:2343
https://access.redhat.com/errata/RHSA-2019:3436
https://access.redhat.com/errata/RHSA-2019:4126
https://access.redhat.com/errata/RHSA-2020:0250
https://access.redhat.com/errata/RHSA-2020:0251
https://access.redhat.com/security/cve/CVE-2019-0220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0220
https://linux.oracle.com/cve/CVE-2019-0220.html
https://linux.oracle.com/errata/ELSA-2019-3436.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r31f46d1f16ffcafa68058596b21f6eaf6d352290e522690a1cdccdd7@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
https://seclists.org/bugtraq/2019/Apr/5
https://security.netapp.com/advisory/ntap-20190625-0007/
https://support.f5.com/csp/article/K44591505
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
https://ubuntu.com/security/notices/USN-3937-1
https://usn.ubuntu.com/3937-1/
https://www.debian.org/security/2019/dsa-4422
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
apt CVE-2016-1252 HIGH 1.0.1ubuntu2.10 1.0.1ubuntu2.17
Expand...http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html
http://www.ubuntu.com/usn/USN-3156-1
https://bugs.chromium.org/p/project-zero/issues/detail?id=1020
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1252
https://ubuntu.com/security/notices/USN-3156-1
https://www.debian.org/security/2016/dsa-3733
https://www.exploit-db.com/exploits/40916/
apt CVE-2019-3462 HIGH 1.0.1ubuntu2.10 1.0.1ubuntu2.19
Expand...http://www.securityfocus.com/bid/106690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3462
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html
https://security.netapp.com/advisory/ntap-20190125-0002/
https://ubuntu.com/security/notices/USN-3863-1
https://ubuntu.com/security/notices/USN-3863-2
https://usn.ubuntu.com/3863-1/
https://usn.ubuntu.com/3863-2/
https://www.debian.org/security/2019/dsa-4371
apt-utils CVE-2016-1252 HIGH 1.0.1ubuntu2.10 1.0.1ubuntu2.17
Expand...http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html
http://www.ubuntu.com/usn/USN-3156-1
https://bugs.chromium.org/p/project-zero/issues/detail?id=1020
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1252
https://ubuntu.com/security/notices/USN-3156-1
https://www.debian.org/security/2016/dsa-3733
https://www.exploit-db.com/exploits/40916/
apt-utils CVE-2019-3462 HIGH 1.0.1ubuntu2.10 1.0.1ubuntu2.19
Expand...http://www.securityfocus.com/bid/106690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3462
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html
https://security.netapp.com/advisory/ntap-20190125-0002/
https://ubuntu.com/security/notices/USN-3863-1
https://ubuntu.com/security/notices/USN-3863-2
https://usn.ubuntu.com/3863-1/
https://usn.ubuntu.com/3863-2/
https://www.debian.org/security/2019/dsa-4371
bash CVE-2016-7543 MEDIUM 4.3-7ubuntu1.5 4.3-7ubuntu1.7
Expand...http://rhn.redhat.com/errata/RHSA-2017-0725.html
http://www.openwall.com/lists/oss-security/2016/09/26/9
http://www.securityfocus.com/bid/93183
http://www.securitytracker.com/id/1037812
https://access.redhat.com/errata/RHSA-2017:1931
https://access.redhat.com/security/cve/CVE-2016-7543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05388115
https://linux.oracle.com/cve/CVE-2016-7543.html
https://linux.oracle.com/errata/ELSA-2017-1931.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7XOQSHU63Y357NHU5FPTFBM6I3YOCQB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OU3C756YPHDAAPFX76UGZBAQQQ5UMHS5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2VRBSIPZDZ75ZQ2DLITHUIDW4W26KVR/
https://lists.gnu.org/archive/html/bug-bash/2016-09/msg00018.html
https://security.gentoo.org/glsa/201701-02
https://ubuntu.com/security/notices/USN-3294-1
https://ubuntu.com/security/notices/USN-3294-2
bash CVE-2016-0634 LOW 4.3-7ubuntu1.5 4.3-7ubuntu1.7
Expand...http://rhn.redhat.com/errata/RHSA-2017-0725.html
http://www.openwall.com/lists/oss-security/2016/09/16/12
http://www.openwall.com/lists/oss-security/2016/09/16/8
http://www.openwall.com/lists/oss-security/2016/09/18/11
http://www.openwall.com/lists/oss-security/2016/09/19/7
http://www.openwall.com/lists/oss-security/2016/09/20/1
http://www.openwall.com/lists/oss-security/2016/09/27/9
http://www.openwall.com/lists/oss-security/2016/09/29/27
http://www.openwall.com/lists/oss-security/2016/10/07/6
http://www.openwall.com/lists/oss-security/2016/10/10/3
http://www.openwall.com/lists/oss-security/2016/10/10/4
http://www.securityfocus.com/bid/92999
https://access.redhat.com/errata/RHSA-2017:1931
https://access.redhat.com/security/cve/CVE-2016-0634
https://bugzilla.redhat.com/show_bug.cgi?id=1377613
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634
https://linux.oracle.com/cve/CVE-2016-0634.html
https://linux.oracle.com/errata/ELSA-2017-1931.html
https://security.gentoo.org/glsa/201612-39
https://ubuntu.com/security/notices/USN-3294-1
bash CVE-2016-9401 LOW 4.3-7ubuntu1.5 4.3-7ubuntu1.7
Expand...http://rhn.redhat.com/errata/RHSA-2017-0725.html
http://www.openwall.com/lists/oss-security/2016/11/17/5
http://www.openwall.com/lists/oss-security/2016/11/17/9
http://www.securityfocus.com/bid/94398
https://access.redhat.com/errata/RHSA-2017:1931
https://access.redhat.com/security/cve/CVE-2016-9401
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401
https://linux.oracle.com/cve/CVE-2016-9401.html
https://linux.oracle.com/errata/ELSA-2017-1931.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00028.html
https://security.gentoo.org/glsa/201701-02
https://ubuntu.com/security/notices/USN-3294-1
busybox-initramfs CVE-2015-9261 MEDIUM 1:1.21.0-1ubuntu1 1:1.21.0-1ubuntu1.4
Expand...http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://seclists.org/fulldisclosure/2020/Aug/20
http://www.openwall.com/lists/oss-security/2015/10/25/3
https://access.redhat.com/security/cve/CVE-2015-9261
https://bugs.debian.org/803097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9261
https://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://ubuntu.com/security/notices/USN-3935-1
https://usn.ubuntu.com/3935-1/
busybox-initramfs CVE-2017-16544 MEDIUM 1:1.21.0-1ubuntu1 1:1.21.0-1ubuntu1.4
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://seclists.org/fulldisclosure/2020/Aug/20
http://seclists.org/fulldisclosure/2020/Mar/15
http://seclists.org/fulldisclosure/2020/Sep/6
http://seclists.org/fulldisclosure/2021/Aug/21
http://seclists.org/fulldisclosure/2021/Jan/39
http://www.vmware.com/security/advisories/VMSA-2019-0013.html
https://access.redhat.com/security/cve/CVE-2017-16544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16544
https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://ubuntu.com/security/notices/USN-3935-1
https://us-cert.cisa.gov/ics/advisories/icsa-20-240-01
https://usn.ubuntu.com/3935-1/
https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/
busybox-initramfs CVE-2018-1000517 MEDIUM 1:1.21.0-1ubuntu1 1:1.21.0-1ubuntu1.4
Expand...https://access.redhat.com/security/cve/CVE-2018-1000517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000517
https://git.busybox.net/busybox/commit/?id=8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html
https://ubuntu.com/security/notices/USN-3935-1
https://usn.ubuntu.com/3935-1/
busybox-initramfs CVE-2019-5747 MEDIUM 1:1.21.0-1ubuntu1 1:1.21.0-1ubuntu1.4
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Sep/7
https://access.redhat.com/security/cve/CVE-2019-5747
https://bugs.busybox.net/show_bug.cgi?id=11506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5747
https://git.busybox.net/busybox/commit/?id=74d9f1ba37010face4bd1449df4d60dd84450b06
https://seclists.org/bugtraq/2019/Sep/7
https://ubuntu.com/security/notices/USN-3935-1
https://usn.ubuntu.com/3935-1/
busybox-initramfs CVE-2011-5325 LOW 1:1.21.0-1ubuntu1 1:1.21.0-1ubuntu1.4
Expand...http://openwall.com/lists/oss-security/2015/10/21/4
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2020/Aug/20
http://www.openwall.com/lists/oss-security/2015/10/21/7
https://access.redhat.com/security/cve/CVE-2011-5325
https://bugzilla.redhat.com/show_bug.cgi?id=1274215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5325
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html
https://seclists.org/bugtraq/2019/Jun/14
https://ubuntu.com/security/notices/USN-3935-1
https://usn.ubuntu.com/3935-1/
busybox-initramfs CVE-2014-9645 LOW 1:1.21.0-1ubuntu1 1:1.21.0-1ubuntu1.4
Expand...http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
http://openwall.com/lists/oss-security/2015/01/24/4
http://seclists.org/fulldisclosure/2020/Mar/15
http://www.securityfocus.com/bid/72324
https://access.redhat.com/security/cve/CVE-2014-9645
https://bugs.busybox.net/show_bug.cgi?id=7652
https://bugzilla.redhat.com/show_bug.cgi?id=1185707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9645
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu
https://security.gentoo.org/glsa/201503-13
https://ubuntu.com/security/notices/USN-3935-1
https://usn.ubuntu.com/3935-1/
busybox-initramfs CVE-2016-2147 LOW 1:1.21.0-1ubuntu1 1:1.21.0-1ubuntu1.4
Expand...http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://seclists.org/fulldisclosure/2020/Aug/20
http://www.openwall.com/lists/oss-security/2016/03/11/16
https://access.redhat.com/security/cve/CVE-2016-2147
https://busybox.net/news.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2147
https://git.busybox.net/busybox/commit/?id=d474ffc68290e0a83651c4432eeabfa62cd51e87
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201612-04
https://ubuntu.com/security/notices/USN-3935-1
https://usn.ubuntu.com/3935-1/
busybox-initramfs CVE-2016-2148 LOW 1:1.21.0-1ubuntu1 1:1.21.0-1ubuntu1.4
Expand...http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://seclists.org/fulldisclosure/2020/Aug/20
http://www.openwall.com/lists/oss-security/2016/03/11/16
https://access.redhat.com/security/cve/CVE-2016-2148
https://busybox.net/news.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2148
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201612-04
https://ubuntu.com/security/notices/USN-3935-1
https://usn.ubuntu.com/3935-1/
busybox-initramfs CVE-2017-15873 LOW 1:1.21.0-1ubuntu1 1:1.21.0-1ubuntu1.4
Expand...https://access.redhat.com/security/cve/CVE-2017-15873
https://bugs.busybox.net/show_bug.cgi?id=10431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15873
https://git.busybox.net/busybox/commit/?id=0402cb32df015d9372578e3db27db47b33d5c7b0
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html
https://ubuntu.com/security/notices/USN-3935-1
https://usn.ubuntu.com/3935-1/
busybox-initramfs CVE-2018-20679 LOW 1:1.21.0-1ubuntu1 1:1.21.0-1ubuntu1.4
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Sep/7
https://access.redhat.com/security/cve/CVE-2018-20679
https://bugs.busybox.net/show_bug.cgi?id=11506
https://busybox.net/news.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20679
https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c
https://seclists.org/bugtraq/2019/Sep/7
https://ubuntu.com/security/notices/USN-3935-1
https://usn.ubuntu.com/3935-1/
cpio CVE-2016-2037 MEDIUM 2.11+dfsg-1ubuntu1.1 2.11+dfsg-1ubuntu1.2
Expand...http://www.debian.org/security/2016/dsa-3483
http://www.openwall.com/lists/oss-security/2016/01/19/4
http://www.openwall.com/lists/oss-security/2016/01/22/4
http://www.securityfocus.com/bid/82293
http://www.securitytracker.com/id/1035067
http://www.ubuntu.com/usn/USN-2906-1
https://access.redhat.com/security/cve/CVE-2016-2037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037
https://ubuntu.com/security/notices/USN-2906-1
cpio CVE-2015-1197 LOW 2.11+dfsg-1ubuntu1.1 2.11+dfsg-1ubuntu1.2
Expand...http://advisories.mageia.org/MGASA-2015-0080.html
http://www.mandriva.com/security/advisories?name=MDVSA-2015:066
http://www.openwall.com/lists/oss-security/2015/01/07/5
http://www.openwall.com/lists/oss-security/2015/01/18/7
http://www.securityfocus.com/bid/71914
http://www.ubuntu.com/usn/USN-2906-1
https://access.redhat.com/security/cve/CVE-2015-1197
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1197
https://lists.gnu.org/archive/html/bug-cpio/2015-01/msg00000.html
https://ubuntu.com/security/notices/USN-2906-1
eject CVE-2017-6964 MEDIUM 2.1.5+deb1+cvs20081104-13.1 2.1.5+deb1+cvs20081104-13.1ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3823
http://www.securityfocus.com/bid/97154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6964
https://launchpad.net/bugs/1673627
https://ubuntu.com/security/notices/USN-3246-1
https://www.debian.org/security/2017/dsa-3823
https://www.ubuntu.com/usn/usn-3246-1/
file CVE-2014-9620 LOW 1:5.14-2ubuntu3.3 1:5.14-2ubuntu3.4
Expand...http://advisories.mageia.org/MGASA-2015-0040.html
http://mx.gw.com/pipermail/file/2014/001653.html
http://mx.gw.com/pipermail/file/2015/001660.html
http://rhn.redhat.com/errata/RHSA-2016-0760.html
http://www.debian.org/security/2015/dsa-3121
http://www.openwall.com/lists/oss-security/2015/01/17/9
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/71715
https://access.redhat.com/security/cve/CVE-2014-9620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620
https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4
https://linux.oracle.com/cve/CVE-2014-9620.html
https://linux.oracle.com/errata/ELSA-2016-0760.html
https://security.gentoo.org/glsa/201503-08
https://ubuntu.com/security/notices/USN-3686-1
https://usn.ubuntu.com/3686-1/
file CVE-2014-9621 LOW 1:5.14-2ubuntu3.3 1:5.14-2ubuntu3.4
Expand...http://advisories.mageia.org/MGASA-2015-0040.html
http://mx.gw.com/pipermail/file/2014/001654.html
http://mx.gw.com/pipermail/file/2015/001660.html
http://www.openwall.com/lists/oss-security/2015/01/17/9
https://access.redhat.com/security/cve/CVE-2014-9621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9621
https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c
https://security.gentoo.org/glsa/201503-08
https://ubuntu.com/security/notices/USN-3686-1
https://usn.ubuntu.com/3686-1/
file CVE-2014-9653 LOW 1:5.14-2ubuntu3.3 1:5.14-2ubuntu3.4
Expand...http://bugs.gw.com/view.php?id=409
http://marc.info/?l=bugtraq&m=143748090628601&w=2
http://marc.info/?l=bugtraq&m=144050155601375&w=2
http://mx.gw.com/pipermail/file/2014/001649.html
http://openwall.com/lists/oss-security/2015/02/05/13
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-0760.html
http://www.debian.org/security/2015/dsa-3196
http://www.openwall.com/lists/oss-security/2015/02/04/13
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securityfocus.com/bid/72516
https://access.redhat.com/security/cve/CVE-2014-9653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9653
https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f
https://linux.oracle.com/cve/CVE-2014-9653.html
https://linux.oracle.com/errata/ELSA-2016-0760.html
https://security.gentoo.org/glsa/201701-42
https://ubuntu.com/security/notices/USN-3686-1
https://usn.ubuntu.com/3686-1/
file CVE-2015-8865 LOW 1:5.14-2ubuntu3.3 1:5.14-2ubuntu3.4
Expand...http://bugs.gw.com/view.php?id=522
http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85802
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8865
https://bugs.php.net/bug.php?id=71527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
file CVE-2018-10360 LOW 1:5.14-2ubuntu3.3 1:5.14-2ubuntu3.4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html
https://access.redhat.com/security/cve/CVE-2018-10360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10360
https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22
https://linux.oracle.com/cve/CVE-2018-10360.html
https://linux.oracle.com/errata/ELSA-2020-1022.html
https://security.gentoo.org/glsa/201806-08
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
git CVE-2016-2315 HIGH 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.3
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183147.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179121.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180763.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00074.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00077.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00011.html
http://pastebin.com/UX2P2jjg
http://rhn.redhat.com/errata/RHSA-2016-0496.html
http://www.debian.org/security/2016/dsa-3521
http://www.openwall.com/lists/oss-security/2016/03/15/5
http://www.openwall.com/lists/oss-security/2016/03/16/2
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/84355
http://www.securitytracker.com/id/1035290
http://www.ubuntu.com/usn/USN-2938-1
https://access.redhat.com/security/cve/CVE-2016-2315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315
https://github.com/git/git/commit/34fa79a6cde56d6d428ab0d3160cb094ebad3305
https://github.com/git/git/commit/de1e67d0703894cb6ea782e36abb63976ab07e60
https://linux.oracle.com/cve/CVE-2016-2315.html
https://linux.oracle.com/errata/ELSA-2016-0496.html
https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.7.4.txt
https://security.gentoo.org/glsa/201605-01
https://ubuntu.com/security/notices/USN-2938-1
git CVE-2018-11235 HIGH 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
http://www.securityfocus.com/bid/104345
http://www.securitytracker.com/id/1040991
https://access.redhat.com/errata/RHSA-2018:1957
https://access.redhat.com/errata/RHSA-2018:2147
https://access.redhat.com/security/cve/CVE-2018-11235
https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235
https://linux.oracle.com/cve/CVE-2018-11235.html
https://linux.oracle.com/errata/ELSA-2018-1957.html
https://lkml.org/lkml/2018/5/29/889
https://marc.info/?l=git&m=152761328506724&w=2
https://security.gentoo.org/glsa/201805-13
https://ubuntu.com/security/notices/USN-3671-1
https://usn.ubuntu.com/3671-1/
https://www.debian.org/security/2018/dsa-4212
https://www.edwardthomson.com/blog/upgrading_git_for_cve2018_11235.html
https://www.exploit-db.com/exploits/44822/
git CVE-2014-9938 MEDIUM 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.4
Expand...https://access.redhat.com/errata/RHSA-2017:2004
https://access.redhat.com/security/cve/CVE-2014-9938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9938
https://github.com/git/git/commit/8976500cbbb13270398d3b3e07a17b8cc7bff43f
https://github.com/njhartwell/pw3nage
https://linux.oracle.com/cve/CVE-2014-9938.html
https://linux.oracle.com/errata/ELSA-2017-2004.html
https://ubuntu.com/security/notices/USN-3243-1
git CVE-2016-2324 MEDIUM 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.3
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183147.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179121.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180763.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00074.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00077.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00011.html
http://pastebin.com/UX2P2jjg
http://rhn.redhat.com/errata/RHSA-2016-0496.html
http://www.debian.org/security/2016/dsa-3521
http://www.openwall.com/lists/oss-security/2016/03/15/5
http://www.openwall.com/lists/oss-security/2016/03/16/2
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/84355
http://www.securitytracker.com/id/1035290
http://www.ubuntu.com/usn/USN-2938-1
https://access.redhat.com/security/cve/CVE-2016-2324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324
https://github.com/git/git/commit/de1e67d0703894cb6ea782e36abb63976ab07e60
https://linux.oracle.com/cve/CVE-2016-2324.html
https://linux.oracle.com/errata/ELSA-2016-0496.html
https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.7.4.txt
https://security.gentoo.org/glsa/201605-01
https://ubuntu.com/security/notices/USN-2938-1
git CVE-2017-1000117 MEDIUM 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.6
Expand...http://blog.recurity-labs.com/2017-08-10/scm-vulns
http://marc.info/?l=git&m=150238802328673&w=2
http://www.debian.org/security/2017/dsa-3934
http://www.securityfocus.com/bid/100283
http://www.securitytracker.com/id/1039131
https://access.redhat.com/errata/RHSA-2017:2484
https://access.redhat.com/errata/RHSA-2017:2485
https://access.redhat.com/errata/RHSA-2017:2491
https://access.redhat.com/errata/RHSA-2017:2674
https://access.redhat.com/errata/RHSA-2017:2675
https://access.redhat.com/security/cve/CVE-2017-1000117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117
https://linux.oracle.com/cve/CVE-2017-1000117.html
https://linux.oracle.com/errata/ELSA-2017-2485.html
https://lkml.org/lkml/2017/8/10/757
https://security.gentoo.org/glsa/201709-10
https://support.apple.com/HT208103
https://ubuntu.com/security/notices/USN-3387-1
https://www.exploit-db.com/exploits/42599/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1466490.html
git CVE-2017-14867 MEDIUM 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.7
Expand...http://www.openwall.com/lists/oss-security/2017/09/26/9
http://www.securityfocus.com/bid/101060
http://www.securitytracker.com/id/1039431
https://access.redhat.com/security/cve/CVE-2017-14867
https://bugs.debian.org/876854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14867
https://lists.debian.org/debian-security-announce/2017/msg00246.html
https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/T/#u
https://ubuntu.com/security/notices/USN-3438-1
https://www.debian.org/security/2017/dsa-3984
git CVE-2017-8386 MEDIUM 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-updates/2017-05/msg00090.html
http://lkml.iu.edu/hypermail/linux/kernel/1705.1/01337.html
http://lkml.iu.edu/hypermail/linux/kernel/1705.1/01346.html
http://public-inbox.org/git/xmqq8tm5ziat.fsf@gitster.mtv.corp.google.com/
http://www.debian.org/security/2017/dsa-3848
http://www.securityfocus.com/bid/98409
http://www.securitytracker.com/id/1038479
http://www.ubuntu.com/usn/USN-3287-1
https://access.redhat.com/errata/RHSA-2017:2004
https://access.redhat.com/errata/RHSA-2017:2491
https://access.redhat.com/security/cve/CVE-2017-8386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8386
https://insinuator.net/2017/05/git-shell-bypass-by-abusing-less-cve-2017-8386/
https://kernel.googlesource.com/pub/scm/git/git/+/3ec804490a265f4c418a321428c12f3f18b7eff5
https://linux.oracle.com/cve/CVE-2017-8386.html
https://linux.oracle.com/errata/ELSA-2017-2004.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ISHYFLM2ACYHHY3JHCLF75X7UF4ZMDM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPYRN7APMHY4ZFDPAKD22J5R4QJFY2JP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDS3LSJJ3YGGQYIVPKQDVOCXWDSF6JGF/
https://security.gentoo.org/glsa/201706-04
https://ubuntu.com/security/notices/USN-3287-1
git CVE-2018-17456 MEDIUM 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html
http://www.securityfocus.com/bid/105523
http://www.securityfocus.com/bid/107511
http://www.securitytracker.com/id/1041811
https://access.redhat.com/errata/RHSA-2018:3408
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2018:3541
https://access.redhat.com/errata/RHSA-2020:0316
https://access.redhat.com/security/cve/CVE-2018-17456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456
https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404
https://github.com/git/git/commit/a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46
https://linux.oracle.com/cve/CVE-2018-17456.html
https://linux.oracle.com/errata/ELSA-2020-0316.html
https://marc.info/?l=git&m=153875888916397&w=2
https://public-inbox.org/git/xmqqy3bcuy3l.fsf@gitster-ct.c.googlers.com/
https://seclists.org/bugtraq/2019/Mar/30
https://ubuntu.com/security/notices/USN-3791-1
https://usn.ubuntu.com/3791-1/
https://www.debian.org/security/2018/dsa-4311
https://www.exploit-db.com/exploits/45548/
https://www.exploit-db.com/exploits/45631/
https://www.openwall.com/lists/oss-security/2018/10/06/3
git CVE-2017-15298 LOW 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.10
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2017-15298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298
https://github.com/Katee/git-bomb
https://kate.io/blog/git-bomb/
https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2
https://ubuntu.com/security/notices/USN-3829-1
https://usn.ubuntu.com/3829-1/
git CVE-2018-11233 LOW 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
http://www.securityfocus.com/bid/104346
http://www.securitytracker.com/id/1040991
https://access.redhat.com/errata/RHSA-2018:2147
https://access.redhat.com/security/cve/CVE-2018-11233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11233
https://lkml.org/lkml/2018/5/29/889
https://marc.info/?l=git&m=152761328506724&w=2
https://security.gentoo.org/glsa/201805-13
https://ubuntu.com/security/notices/USN-3671-1
https://usn.ubuntu.com/3671-1/
git-man CVE-2016-2315 HIGH 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.3
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183147.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179121.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180763.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00074.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00077.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00011.html
http://pastebin.com/UX2P2jjg
http://rhn.redhat.com/errata/RHSA-2016-0496.html
http://www.debian.org/security/2016/dsa-3521
http://www.openwall.com/lists/oss-security/2016/03/15/5
http://www.openwall.com/lists/oss-security/2016/03/16/2
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/84355
http://www.securitytracker.com/id/1035290
http://www.ubuntu.com/usn/USN-2938-1
https://access.redhat.com/security/cve/CVE-2016-2315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315
https://github.com/git/git/commit/34fa79a6cde56d6d428ab0d3160cb094ebad3305
https://github.com/git/git/commit/de1e67d0703894cb6ea782e36abb63976ab07e60
https://linux.oracle.com/cve/CVE-2016-2315.html
https://linux.oracle.com/errata/ELSA-2016-0496.html
https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.7.4.txt
https://security.gentoo.org/glsa/201605-01
https://ubuntu.com/security/notices/USN-2938-1
git-man CVE-2018-11235 HIGH 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
http://www.securityfocus.com/bid/104345
http://www.securitytracker.com/id/1040991
https://access.redhat.com/errata/RHSA-2018:1957
https://access.redhat.com/errata/RHSA-2018:2147
https://access.redhat.com/security/cve/CVE-2018-11235
https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235
https://linux.oracle.com/cve/CVE-2018-11235.html
https://linux.oracle.com/errata/ELSA-2018-1957.html
https://lkml.org/lkml/2018/5/29/889
https://marc.info/?l=git&m=152761328506724&w=2
https://security.gentoo.org/glsa/201805-13
https://ubuntu.com/security/notices/USN-3671-1
https://usn.ubuntu.com/3671-1/
https://www.debian.org/security/2018/dsa-4212
https://www.edwardthomson.com/blog/upgrading_git_for_cve2018_11235.html
https://www.exploit-db.com/exploits/44822/
git-man CVE-2014-9938 MEDIUM 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.4
Expand...https://access.redhat.com/errata/RHSA-2017:2004
https://access.redhat.com/security/cve/CVE-2014-9938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9938
https://github.com/git/git/commit/8976500cbbb13270398d3b3e07a17b8cc7bff43f
https://github.com/njhartwell/pw3nage
https://linux.oracle.com/cve/CVE-2014-9938.html
https://linux.oracle.com/errata/ELSA-2017-2004.html
https://ubuntu.com/security/notices/USN-3243-1
git-man CVE-2016-2324 MEDIUM 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.3
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183147.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179121.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180763.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00074.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00077.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00011.html
http://pastebin.com/UX2P2jjg
http://rhn.redhat.com/errata/RHSA-2016-0496.html
http://www.debian.org/security/2016/dsa-3521
http://www.openwall.com/lists/oss-security/2016/03/15/5
http://www.openwall.com/lists/oss-security/2016/03/16/2
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/84355
http://www.securitytracker.com/id/1035290
http://www.ubuntu.com/usn/USN-2938-1
https://access.redhat.com/security/cve/CVE-2016-2324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324
https://github.com/git/git/commit/de1e67d0703894cb6ea782e36abb63976ab07e60
https://linux.oracle.com/cve/CVE-2016-2324.html
https://linux.oracle.com/errata/ELSA-2016-0496.html
https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.7.4.txt
https://security.gentoo.org/glsa/201605-01
https://ubuntu.com/security/notices/USN-2938-1
git-man CVE-2017-1000117 MEDIUM 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.6
Expand...http://blog.recurity-labs.com/2017-08-10/scm-vulns
http://marc.info/?l=git&m=150238802328673&w=2
http://www.debian.org/security/2017/dsa-3934
http://www.securityfocus.com/bid/100283
http://www.securitytracker.com/id/1039131
https://access.redhat.com/errata/RHSA-2017:2484
https://access.redhat.com/errata/RHSA-2017:2485
https://access.redhat.com/errata/RHSA-2017:2491
https://access.redhat.com/errata/RHSA-2017:2674
https://access.redhat.com/errata/RHSA-2017:2675
https://access.redhat.com/security/cve/CVE-2017-1000117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117
https://linux.oracle.com/cve/CVE-2017-1000117.html
https://linux.oracle.com/errata/ELSA-2017-2485.html
https://lkml.org/lkml/2017/8/10/757
https://security.gentoo.org/glsa/201709-10
https://support.apple.com/HT208103
https://ubuntu.com/security/notices/USN-3387-1
https://www.exploit-db.com/exploits/42599/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1466490.html
git-man CVE-2017-14867 MEDIUM 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.7
Expand...http://www.openwall.com/lists/oss-security/2017/09/26/9
http://www.securityfocus.com/bid/101060
http://www.securitytracker.com/id/1039431
https://access.redhat.com/security/cve/CVE-2017-14867
https://bugs.debian.org/876854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14867
https://lists.debian.org/debian-security-announce/2017/msg00246.html
https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/T/#u
https://ubuntu.com/security/notices/USN-3438-1
https://www.debian.org/security/2017/dsa-3984
git-man CVE-2017-8386 MEDIUM 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-updates/2017-05/msg00090.html
http://lkml.iu.edu/hypermail/linux/kernel/1705.1/01337.html
http://lkml.iu.edu/hypermail/linux/kernel/1705.1/01346.html
http://public-inbox.org/git/xmqq8tm5ziat.fsf@gitster.mtv.corp.google.com/
http://www.debian.org/security/2017/dsa-3848
http://www.securityfocus.com/bid/98409
http://www.securitytracker.com/id/1038479
http://www.ubuntu.com/usn/USN-3287-1
https://access.redhat.com/errata/RHSA-2017:2004
https://access.redhat.com/errata/RHSA-2017:2491
https://access.redhat.com/security/cve/CVE-2017-8386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8386
https://insinuator.net/2017/05/git-shell-bypass-by-abusing-less-cve-2017-8386/
https://kernel.googlesource.com/pub/scm/git/git/+/3ec804490a265f4c418a321428c12f3f18b7eff5
https://linux.oracle.com/cve/CVE-2017-8386.html
https://linux.oracle.com/errata/ELSA-2017-2004.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ISHYFLM2ACYHHY3JHCLF75X7UF4ZMDM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPYRN7APMHY4ZFDPAKD22J5R4QJFY2JP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDS3LSJJ3YGGQYIVPKQDVOCXWDSF6JGF/
https://security.gentoo.org/glsa/201706-04
https://ubuntu.com/security/notices/USN-3287-1
git-man CVE-2018-17456 MEDIUM 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html
http://www.securityfocus.com/bid/105523
http://www.securityfocus.com/bid/107511
http://www.securitytracker.com/id/1041811
https://access.redhat.com/errata/RHSA-2018:3408
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2018:3541
https://access.redhat.com/errata/RHSA-2020:0316
https://access.redhat.com/security/cve/CVE-2018-17456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456
https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404
https://github.com/git/git/commit/a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46
https://linux.oracle.com/cve/CVE-2018-17456.html
https://linux.oracle.com/errata/ELSA-2020-0316.html
https://marc.info/?l=git&m=153875888916397&w=2
https://public-inbox.org/git/xmqqy3bcuy3l.fsf@gitster-ct.c.googlers.com/
https://seclists.org/bugtraq/2019/Mar/30
https://ubuntu.com/security/notices/USN-3791-1
https://usn.ubuntu.com/3791-1/
https://www.debian.org/security/2018/dsa-4311
https://www.exploit-db.com/exploits/45548/
https://www.exploit-db.com/exploits/45631/
https://www.openwall.com/lists/oss-security/2018/10/06/3
git-man CVE-2017-15298 LOW 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.10
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2017-15298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298
https://github.com/Katee/git-bomb
https://kate.io/blog/git-bomb/
https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2
https://ubuntu.com/security/notices/USN-3829-1
https://usn.ubuntu.com/3829-1/
git-man CVE-2018-11233 LOW 1:1.9.1-1ubuntu0.2 1:1.9.1-1ubuntu0.8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
http://www.securityfocus.com/bid/104346
http://www.securitytracker.com/id/1040991
https://access.redhat.com/errata/RHSA-2018:2147
https://access.redhat.com/security/cve/CVE-2018-11233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11233
https://lkml.org/lkml/2018/5/29/889
https://marc.info/?l=git&m=152761328506724&w=2
https://security.gentoo.org/glsa/201805-13
https://ubuntu.com/security/notices/USN-3671-1
https://usn.ubuntu.com/3671-1/
gnupg CVE-2016-6313 HIGH 1.4.16-1ubuntu2.3 1.4.16-1ubuntu2.4
Expand...http://rhn.redhat.com/errata/RHSA-2016-2674.html
http://www.debian.org/security/2016/dsa-3649
http://www.debian.org/security/2016/dsa-3650
http://www.securityfocus.com/bid/92527
http://www.securitytracker.com/id/1036635
http://www.ubuntu.com/usn/USN-3064-1
http://www.ubuntu.com/usn/USN-3065-1
https://access.redhat.com/security/cve/CVE-2016-6313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS
https://linux.oracle.com/cve/CVE-2016-6313.html
https://linux.oracle.com/errata/ELSA-2016-2674.html
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
https://security.gentoo.org/glsa/201610-04
https://security.gentoo.org/glsa/201612-01
https://ubuntu.com/security/notices/USN-3064-1
https://ubuntu.com/security/notices/USN-3065-1
gnupg CVE-2017-7526 MEDIUM 1.4.16-1ubuntu2.3 1.4.16-1ubuntu2.6
Expand...http://www.securityfocus.com/bid/99338
http://www.securitytracker.com/id/1038915
https://access.redhat.com/security/cve/CVE-2017-7526
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526
https://eprint.iacr.org/2017/627
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=78130828e9a140a9de4dafadbc844dbb64cb709a
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=e6a3dc9900433bbc8ad362a595a3837318c28fa9
https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html
https://ubuntu.com/security/notices/USN-3347-1
https://ubuntu.com/security/notices/USN-3347-2
https://ubuntu.com/security/notices/USN-3733-1
https://ubuntu.com/security/notices/USN-3733-2
https://usn.ubuntu.com/3733-1/
https://usn.ubuntu.com/3733-2/
https://www.debian.org/security/2017/dsa-3901
https://www.debian.org/security/2017/dsa-3960
gnupg CVE-2018-12020 MEDIUM 1.4.16-1ubuntu2.3 1.4.16-1ubuntu2.5
Expand...http://openwall.com/lists/oss-security/2018/06/08/2
http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
http://seclists.org/fulldisclosure/2019/Apr/38
http://www.openwall.com/lists/oss-security/2019/04/30/4
http://www.securityfocus.com/bid/104450
http://www.securitytracker.com/id/1041051
https://access.redhat.com/errata/RHSA-2018:2180
https://access.redhat.com/errata/RHSA-2018:2181
https://access.redhat.com/security/cve/CVE-2018-12020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020
https://dev.gnupg.org/T4012
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=210e402acd3e284b32db1901e43bf1470e659e49 (STABLE-BRANCH-2-2)
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2326851c60793653069494379b16d84e4c10a0ac (STABLE-BRANCH-1-4)
https://github.com/RUB-NDS/Johnny-You-Are-Fired
https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-12020.html
https://linux.oracle.com/errata/ELSA-2018-2181.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
https://neopg.io/blog/gpg-signature-spoof/
https://sourceforge.net/p/enigmail/forum/announce/thread/b948279f/
https://ubuntu.com/security/notices/USN-3675-1
https://ubuntu.com/security/notices/USN-3675-2
https://ubuntu.com/security/notices/USN-3675-3
https://ubuntu.com/security/notices/USN-3964-1
https://usn.ubuntu.com/3675-1/
https://usn.ubuntu.com/3675-2/
https://usn.ubuntu.com/3675-3/
https://usn.ubuntu.com/3964-1/
https://www.debian.org/security/2018/dsa-4222
https://www.debian.org/security/2018/dsa-4223
https://www.debian.org/security/2018/dsa-4224
gpgv CVE-2016-6313 HIGH 1.4.16-1ubuntu2.3 1.4.16-1ubuntu2.4
Expand...http://rhn.redhat.com/errata/RHSA-2016-2674.html
http://www.debian.org/security/2016/dsa-3649
http://www.debian.org/security/2016/dsa-3650
http://www.securityfocus.com/bid/92527
http://www.securitytracker.com/id/1036635
http://www.ubuntu.com/usn/USN-3064-1
http://www.ubuntu.com/usn/USN-3065-1
https://access.redhat.com/security/cve/CVE-2016-6313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS
https://linux.oracle.com/cve/CVE-2016-6313.html
https://linux.oracle.com/errata/ELSA-2016-2674.html
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
https://security.gentoo.org/glsa/201610-04
https://security.gentoo.org/glsa/201612-01
https://ubuntu.com/security/notices/USN-3064-1
https://ubuntu.com/security/notices/USN-3065-1
gpgv CVE-2017-7526 MEDIUM 1.4.16-1ubuntu2.3 1.4.16-1ubuntu2.6
Expand...http://www.securityfocus.com/bid/99338
http://www.securitytracker.com/id/1038915
https://access.redhat.com/security/cve/CVE-2017-7526
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526
https://eprint.iacr.org/2017/627
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=78130828e9a140a9de4dafadbc844dbb64cb709a
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=e6a3dc9900433bbc8ad362a595a3837318c28fa9
https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html
https://ubuntu.com/security/notices/USN-3347-1
https://ubuntu.com/security/notices/USN-3347-2
https://ubuntu.com/security/notices/USN-3733-1
https://ubuntu.com/security/notices/USN-3733-2
https://usn.ubuntu.com/3733-1/
https://usn.ubuntu.com/3733-2/
https://www.debian.org/security/2017/dsa-3901
https://www.debian.org/security/2017/dsa-3960
gpgv CVE-2018-12020 MEDIUM 1.4.16-1ubuntu2.3 1.4.16-1ubuntu2.5
Expand...http://openwall.com/lists/oss-security/2018/06/08/2
http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
http://seclists.org/fulldisclosure/2019/Apr/38
http://www.openwall.com/lists/oss-security/2019/04/30/4
http://www.securityfocus.com/bid/104450
http://www.securitytracker.com/id/1041051
https://access.redhat.com/errata/RHSA-2018:2180
https://access.redhat.com/errata/RHSA-2018:2181
https://access.redhat.com/security/cve/CVE-2018-12020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020
https://dev.gnupg.org/T4012
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=210e402acd3e284b32db1901e43bf1470e659e49 (STABLE-BRANCH-2-2)
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2326851c60793653069494379b16d84e4c10a0ac (STABLE-BRANCH-1-4)
https://github.com/RUB-NDS/Johnny-You-Are-Fired
https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-12020.html
https://linux.oracle.com/errata/ELSA-2018-2181.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
https://neopg.io/blog/gpg-signature-spoof/
https://sourceforge.net/p/enigmail/forum/announce/thread/b948279f/
https://ubuntu.com/security/notices/USN-3675-1
https://ubuntu.com/security/notices/USN-3675-2
https://ubuntu.com/security/notices/USN-3675-3
https://ubuntu.com/security/notices/USN-3964-1
https://usn.ubuntu.com/3675-1/
https://usn.ubuntu.com/3675-2/
https://usn.ubuntu.com/3675-3/
https://usn.ubuntu.com/3964-1/
https://www.debian.org/security/2018/dsa-4222
https://www.debian.org/security/2018/dsa-4223
https://www.debian.org/security/2018/dsa-4224
isc-dhcp-client CVE-2018-5732 MEDIUM 4.2.4-7ubuntu12.4 4.2.4-7ubuntu12.12
Expand...https://access.redhat.com/security/cve/CVE-2018-5732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732
https://kb.isc.org/article/AA-01565
https://kb.isc.org/article/AA-01565/75/CVE-2018-5732
https://kb.isc.org/docs/aa-01565
https://linux.oracle.com/cve/CVE-2018-5732.html
https://linux.oracle.com/errata/ELSA-2018-0483.html
https://ubuntu.com/security/notices/USN-3586-1
https://ubuntu.com/security/notices/USN-3586-2
isc-dhcp-client CVE-2018-5733 MEDIUM 4.2.4-7ubuntu12.4 4.2.4-7ubuntu12.12
Expand...http://www.securityfocus.com/bid/103188
http://www.securitytracker.com/id/1040437
https://access.redhat.com/errata/RHSA-2018:0469
https://access.redhat.com/errata/RHSA-2018:0483
https://access.redhat.com/security/cve/CVE-2018-5733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733
https://kb.isc.org/article/AA-01567
https://kb.isc.org/article/AA-01567/75/CVE-2018-5733
https://kb.isc.org/docs/aa-01567
https://linux.oracle.com/cve/CVE-2018-5733.html
https://linux.oracle.com/errata/ELSA-2018-0483.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00015.html
https://ubuntu.com/security/notices/USN-3586-1
https://ubuntu.com/security/notices/USN-3586-2
https://usn.ubuntu.com/3586-1/
https://usn.ubuntu.com/3586-2/
https://www.debian.org/security/2018/dsa-4133
isc-dhcp-client CVE-2016-2774 LOW 4.2.4-7ubuntu12.4 4.2.4-7ubuntu12.12
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183458.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183640.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html
http://rhn.redhat.com/errata/RHSA-2016-2590.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/84208
http://www.securitytracker.com/id/1035196
https://access.redhat.com/security/cve/CVE-2016-2774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2774
https://kb.isc.org/article/AA-01354
https://linux.oracle.com/cve/CVE-2016-2774.html
https://linux.oracle.com/errata/ELSA-2016-2590.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00023.html
https://ubuntu.com/security/notices/USN-3586-1
https://usn.ubuntu.com/3586-1/
isc-dhcp-client CVE-2017-3144 LOW 4.2.4-7ubuntu12.4 4.2.4-7ubuntu12.12
Expand...http://www.securityfocus.com/bid/102726
http://www.securitytracker.com/id/1040194
https://access.redhat.com/errata/RHSA-2018:0158
https://access.redhat.com/security/cve/CVE-2017-3144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144
https://kb.isc.org/article/AA-01541
https://kb.isc.org/docs/aa-01541
https://linux.oracle.com/cve/CVE-2017-3144.html
https://linux.oracle.com/errata/ELSA-2018-0158.html
https://ubuntu.com/security/notices/USN-3586-1
https://usn.ubuntu.com/3586-1/
https://www.debian.org/security/2018/dsa-4133
isc-dhcp-common CVE-2018-5732 MEDIUM 4.2.4-7ubuntu12.4 4.2.4-7ubuntu12.12
Expand...https://access.redhat.com/security/cve/CVE-2018-5732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732
https://kb.isc.org/article/AA-01565
https://kb.isc.org/article/AA-01565/75/CVE-2018-5732
https://kb.isc.org/docs/aa-01565
https://linux.oracle.com/cve/CVE-2018-5732.html
https://linux.oracle.com/errata/ELSA-2018-0483.html
https://ubuntu.com/security/notices/USN-3586-1
https://ubuntu.com/security/notices/USN-3586-2
isc-dhcp-common CVE-2018-5733 MEDIUM 4.2.4-7ubuntu12.4 4.2.4-7ubuntu12.12
Expand...http://www.securityfocus.com/bid/103188
http://www.securitytracker.com/id/1040437
https://access.redhat.com/errata/RHSA-2018:0469
https://access.redhat.com/errata/RHSA-2018:0483
https://access.redhat.com/security/cve/CVE-2018-5733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733
https://kb.isc.org/article/AA-01567
https://kb.isc.org/article/AA-01567/75/CVE-2018-5733
https://kb.isc.org/docs/aa-01567
https://linux.oracle.com/cve/CVE-2018-5733.html
https://linux.oracle.com/errata/ELSA-2018-0483.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00015.html
https://ubuntu.com/security/notices/USN-3586-1
https://ubuntu.com/security/notices/USN-3586-2
https://usn.ubuntu.com/3586-1/
https://usn.ubuntu.com/3586-2/
https://www.debian.org/security/2018/dsa-4133
isc-dhcp-common CVE-2016-2774 LOW 4.2.4-7ubuntu12.4 4.2.4-7ubuntu12.12
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183458.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183640.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html
http://rhn.redhat.com/errata/RHSA-2016-2590.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/84208
http://www.securitytracker.com/id/1035196
https://access.redhat.com/security/cve/CVE-2016-2774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2774
https://kb.isc.org/article/AA-01354
https://linux.oracle.com/cve/CVE-2016-2774.html
https://linux.oracle.com/errata/ELSA-2016-2590.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00023.html
https://ubuntu.com/security/notices/USN-3586-1
https://usn.ubuntu.com/3586-1/
isc-dhcp-common CVE-2017-3144 LOW 4.2.4-7ubuntu12.4 4.2.4-7ubuntu12.12
Expand...http://www.securityfocus.com/bid/102726
http://www.securitytracker.com/id/1040194
https://access.redhat.com/errata/RHSA-2018:0158
https://access.redhat.com/security/cve/CVE-2017-3144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144
https://kb.isc.org/article/AA-01541
https://kb.isc.org/docs/aa-01541
https://linux.oracle.com/cve/CVE-2017-3144.html
https://linux.oracle.com/errata/ELSA-2018-0158.html
https://ubuntu.com/security/notices/USN-3586-1
https://usn.ubuntu.com/3586-1/
https://www.debian.org/security/2018/dsa-4133
krb5-locales CVE-2015-8629 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0493.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/82801
http://www.securitytracker.com/id/1034914
https://access.redhat.com/security/cve/CVE-2015-8629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb
https://linux.oracle.com/cve/CVE-2015-8629.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
krb5-locales CVE-2015-8630 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securitytracker.com/id/1034915
https://access.redhat.com/security/cve/CVE-2015-8630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630
https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b
https://linux.oracle.com/cve/CVE-2015-8630.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
krb5-locales CVE-2015-8631 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0493.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securitytracker.com/id/1034916
https://access.redhat.com/security/cve/CVE-2015-8631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
https://linux.oracle.com/cve/CVE-2015-8631.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
krb5-locales CVE-2016-3119 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html
http://rhn.redhat.com/errata/RHSA-2016-2591.html
http://www.securityfocus.com/bid/85392
http://www.securitytracker.com/id/1035399
https://access.redhat.com/security/cve/CVE-2016-3119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119
https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99
https://linux.oracle.com/cve/CVE-2016-3119.html
https://linux.oracle.com/errata/ELSA-2016-2591.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
krb5-locales CVE-2016-3120 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html
http://rhn.redhat.com/errata/RHSA-2016-2591.html
http://web.mit.edu/kerberos/krb5-1.13/
http://web.mit.edu/kerberos/krb5-1.14/
http://www.securityfocus.com/bid/92132
http://www.securitytracker.com/id/1036442
https://access.redhat.com/security/cve/CVE-2016-3120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120
https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
https://linux.oracle.com/cve/CVE-2016-3120.html
https://linux.oracle.com/errata/ELSA-2016-2591.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
krb5-locales CVE-2017-11368 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securityfocus.com/bid/100291
https://access.redhat.com/errata/RHSA-2018:0666
https://access.redhat.com/security/cve/CVE-2017-11368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368
https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970
https://github.com/krb5/krb5/pull/678/files
https://linux.oracle.com/cve/CVE-2017-11368.html
https://linux.oracle.com/errata/ELSA-2018-0666.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HNWXM6OQU7G23MG7XWIOBRGP43ECLDT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBUTXMNZWMVJLQ4NDX5OQFPUVCJRLV3W/
krb5-locales CVE-2017-11462 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
krb5-locales CVE-2018-5729 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
krb5-locales CVE-2018-5730 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libapache2-mod-php5 CVE-2015-8835 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.securityfocus.com/bid/84426
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8835
https://bugs.php.net/bug.php?id=70081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835
https://ubuntu.com/security/notices/USN-2952-1
libapache2-mod-php5 CVE-2015-8838 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=97aa752fee61fccdec361279adbfb17a3c60f3f4
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8838
https://bugs.php.net/bug.php?id=69669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8838
https://ubuntu.com/security/notices/USN-2952-1
libapache2-mod-php5 CVE-2015-8866 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://framework.zend.com/security/advisory/ZF2015-06 -> Relation to CVE-2015-5161
http://git.php.net/?p=php-src.git;a=commit;h=de31324c221c1791b26350ba106cc26bad23ace9
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/21/8
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/87470
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8866
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817
https://bugs.php.net/bug.php?id=64938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866
https://ubuntu.com/security/notices/USN-2952-1
libapache2-mod-php5 CVE-2015-8867 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/21/8
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8867
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1534203
https://bugs.php.net/bug.php?id=70014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8867
https://ubuntu.com/security/notices/USN-2952-1
libapache2-mod-php5 CVE-2015-8876 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.php.net/ChangeLog-5.php
https://access.redhat.com/security/cve/CVE-2015-8876
https://bugs.php.net/bug.php?id=70121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8876
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2015-8935 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/06/20/3
https://access.redhat.com/security/cve/CVE-2015-8935
https://bugs.php.net/bug.php?id=68978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8935
https://github.com/php/php-src/commit/996faf964bba1aec06b153b370a7f20d3dd2bb8b?w=1
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-10160 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95783
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10160
https://bugs.php.net/bug.php?id=73768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160
https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
libapache2-mod-php5 CVE-2016-10397 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99552
https://access.redhat.com/security/cve/CVE-2016-10397
https://bugs.php.net/bug.php?id=73192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10397
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
libapache2-mod-php5 CVE-2016-2554 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/02/22/5
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-2554
https://bugs.php.net/bug.php?id=71488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-2952-1
libapache2-mod-php5 CVE-2016-3141 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b1bd4119bcafab6f9a8f84d92cd65eec3afeface
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/10/5
http://www.openwall.com/lists/oss-security/2016/03/13/1
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
http://www.securityfocus.com/bid/84271
http://www.securitytracker.com/id/1035255
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3141
https://bugs.php.net/bug.php?id=71587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141
https://php.net/ChangeLog-5.php
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
libapache2-mod-php5 CVE-2016-3185 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://php.net/ChangeLog-7.php#7.0.4
http://www.securityfocus.com/bid/84307
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3185
https://bugs.php.net/bug.php?id=70081
https://bugs.php.net/bug.php?id=71610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3185
https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba
https://secure.php.net/ChangeLog-5.php#5.6.12
https://ubuntu.com/security/notices/USN-2952-1
libapache2-mod-php5 CVE-2016-4070 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85801
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4070
https://bugs.php.net/bug.php?id=71798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070
https://git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
libapache2-mod-php5 CVE-2016-4071 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85800
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4071
https://bugs.php.net/bug.php?id=71704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4071
https://git.php.net/?p=php-src.git;a=commit;h=6e25966544fb1d2f3d7596e060ce9c9269bbdcf8
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://www.exploit-db.com/exploits/39645/
libapache2-mod-php5 CVE-2016-4072 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85993
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4072
https://bugs.php.net/bug.php?id=71860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4072
https://gist.github.com/smalyshev/80b5c2909832872f2ba2
https://git.php.net/?p=php-src.git;a=commit;h=1e9b175204e3286d64dfd6c9f09151c31b5e099a
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
libapache2-mod-php5 CVE-2016-4073 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85991
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4073
https://bugs.php.net/bug.php?id=71906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4073
https://gist.github.com/smalyshev/d8355c96a657cc5dba70
https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
libapache2-mod-php5 CVE-2016-4342 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/28/2
http://www.securityfocus.com/bid/89154
https://access.redhat.com/security/cve/CVE-2016-4342
https://bugs.php.net/bug.php?id=71354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://ubuntu.com/security/notices/USN-2984-1
libapache2-mod-php5 CVE-2016-4343 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/28/2
http://www.securityfocus.com/bid/89179
https://access.redhat.com/security/cve/CVE-2016-4343
https://bugs.php.net/bug.php?id=71331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4343
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://ubuntu.com/security/notices/USN-2984-1
libapache2-mod-php5 CVE-2016-4538 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90173
https://access.redhat.com/security/cve/CVE-2016-4538
https://bugs.php.net/bug.php?id=72093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538
https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
libapache2-mod-php5 CVE-2016-4539 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90174
https://access.redhat.com/security/cve/CVE-2016-4539
https://bugs.php.net/bug.php?id=72099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539
https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
libapache2-mod-php5 CVE-2016-5385 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-7.php#7.0.9
http://rhn.redhat.com/errata/RHSA-2016-1609.html
http://rhn.redhat.com/errata/RHSA-2016-1610.html
http://rhn.redhat.com/errata/RHSA-2016-1611.html
http://rhn.redhat.com/errata/RHSA-2016-1612.html
http://rhn.redhat.com/errata/RHSA-2016-1613.html
http://www.debian.org/security/2016/dsa-3631
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91821
http://www.securitytracker.com/id/1036335
https://access.redhat.com/security/cve/CVE-2016-5385
https://bugzilla.redhat.com/show_bug.cgi?id=1353794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385
https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml
https://github.com/advisories/GHSA-m6ch-gg5f-wxx3
https://github.com/guzzle/guzzle/releases/tag/6.2.1
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5385.html
https://linux.oracle.com/errata/ELSA-2016-1613.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/
https://nvd.nist.gov/vuln/detail/CVE-2016-5385
https://security.gentoo.org/glsa/201611-22
https://typo3.org/security/advisory/typo3-core-sa-2016-019
https://ubuntu.com/security/notices/USN-3045-1
https://www.drupal.org/SA-CORE-2016-003
libapache2-mod-php5 CVE-2016-5399 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://php.net/ChangeLog-7.php#7.0.9
http://rhn.redhat.com/errata/RHSA-2016-2598.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://seclists.org/fulldisclosure/2016/Jul/72
http://www.debian.org/security/2016/dsa-3631
http://www.openwall.com/lists/oss-security/2016/07/21/1
http://www.securityfocus.com/archive/1/538966/100/0/threaded
http://www.securityfocus.com/bid/92051
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-5399
https://bugs.php.net/bug.php?id=72613
https://bugzilla.redhat.com/show_bug.cgi?id=1358395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399
https://linux.oracle.com/cve/CVE-2016-5399.html
https://linux.oracle.com/errata/ELSA-2016-2598.html
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3045-1
https://www.exploit-db.com/exploits/40155/
libapache2-mod-php5 CVE-2016-5768 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/5b597a2e5b28e2d5a52fc1be13f425f08f47cb62?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2598.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91396
https://access.redhat.com/security/cve/CVE-2016-5768
https://bugs.php.net/bug.php?id=72402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://linux.oracle.com/cve/CVE-2016-5768.html
https://linux.oracle.com/errata/ELSA-2016-2598.html
https://marc.info/?l=oss-security&m=146668499803695&w=2
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-5769 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91399
https://access.redhat.com/security/cve/CVE-2016-5769
https://bugs.php.net/bug.php?id=72455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://marc.info/?l=oss-security&m=146668499803695&w=2
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-5772 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91398
https://access.redhat.com/security/cve/CVE-2016-5772
https://bugs.php.net/bug.php?id=72340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-6288 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=629e4da7cc8b174acdeab84969cbfc606a019b31
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.securityfocus.com/bid/92111
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6288
https://bugs.php.net/70480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-6289 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities
http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92074
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6289
https://bugs.php.net/72513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-6290 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=3798eb6fd5dddb211b01d41495072fd9858d4e32
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92097
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6290
https://bugs.php.net/72562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-6291 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=eebcbd5de38a0f1c2876035402cb770e37476519
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92073
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6291
https://bugs.php.net/72603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-6292 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=41131cd41d2fd2e0c2f332a27988df75659c42e4
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92078
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6292
https://bugs.php.net/72618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-6294 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92115
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6294
https://bugs.php.net/72533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-6295 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=cab1c3b3708eead315e033359d07049b23b147a3
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92094
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6295
https://bugs.php.net/72479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-6296 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e6c48213c22ed50b2b987b479fcc1ac709394caa
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92095
http://www.securitytracker.com/id/1036430
http://www.ubuntu.com/usn/USN-3059-1
https://access.redhat.com/security/cve/CVE-2016-6296
https://bugs.php.net/72606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296
https://lists.debian.org/debian-lts-announce/2019/11/msg00029.html
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
https://ubuntu.com/security/notices/USN-3059-1
libapache2-mod-php5 CVE-2016-6297 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities
http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92099
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6297
https://bugs.php.net/72520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-7127 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92757
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7127
https://bugs.php.net/bug.php?id=72730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
https://github.com/php/php-src/commit/1bd103df00f49cf4d4ade2cfe3f456ac058a4eae?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-7129 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92758
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7129
https://bugs.php.net/bug.php?id=72749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
https://github.com/php/php-src/commit/426aeb2808955ee3d3f52e0cfb102834cdb836a5?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-7130 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92764
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7130
https://bugs.php.net/bug.php?id=72750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130
https://github.com/php/php-src/commit/698a691724c0a949295991e5df091ce16f899e02?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-7131 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92768
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7131
https://bugs.php.net/bug.php?id=72790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131
https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-7132 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92767
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7132
https://bugs.php.net/bug.php?id=72799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132
https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-7411 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/93009
http://www.securitytracker.com/id/1036836
https://access.redhat.com/security/cve/CVE-2016-7411
https://bugs.php.net/bug.php?id=73052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411
https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
libapache2-mod-php5 CVE-2016-7412 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93005
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7412
https://bugs.php.net/bug.php?id=72293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412
https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-7413 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93006
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7413
https://bugs.php.net/bug.php?id=72860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413
https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-7414 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93004
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7414
https://bugs.php.net/bug.php?id=72928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414
https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-7417 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93007
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7417
https://bugs.php.net/bug.php?id=73029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417
https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-7478 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7
http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
http://www.securityfocus.com/bid/95150
https://access.redhat.com/security/cve/CVE-2016-7478
https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
https://bugs.php.net/bug.php?id=73093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://www.youtube.com/watch?v=LDcaPstAuPk
libapache2-mod-php5 CVE-2016-7479 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7
http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
http://www.securityfocus.com/bid/95151
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7479
https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
https://bugs.php.net/bug.php?id=73092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.youtube.com/watch?v=LDcaPstAuPk
libapache2-mod-php5 CVE-2016-9934 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.openwall.com/lists/oss-security/2016/12/12/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/94845
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-9934
https://bugs.php.net/bug.php?id=73331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d
https://ubuntu.com/security/notices/USN-3196-1
libapache2-mod-php5 CVE-2016-9935 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.debian.org/security/2016/dsa-3737
http://www.openwall.com/lists/oss-security/2016/12/12/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/94846
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-9935
https://bugs.php.net/bug.php?id=73631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
https://security.gentoo.org/glsa/201702-29
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
libapache2-mod-php5 CVE-2017-11143 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/99553
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11143
https://bugs.php.net/bug.php?id=74145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143
https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
libapache2-mod-php5 CVE-2017-11144 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=73cabfedf519298e1a11192699f44d53c529315e
http://git.php.net/?p=php-src.git;a=commit;h=89637c6b41b510c20d262c17483f582f115c66d6
http://git.php.net/?p=php-src.git;a=commit;h=91826a311dd37f4c4e5d605fa7af331e80ddd4c3
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11144
https://bugs.php.net/bug.php?id=74651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
libapache2-mod-php5 CVE-2017-11145 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e8b7698f5ee757ce2c8bd10a192a491a498f891c
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99550
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11145
https://bugs.php.net/bug.php?id=74819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145
https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
libapache2-mod-php5 CVE-2017-11147 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99607
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11147
https://bugs.php.net/bug.php?id=73773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11147
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.tenable.com/security/tns-2017-12
libapache2-mod-php5 CVE-2017-11628 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e
http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c
http://www.securityfocus.com/bid/99489
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11628
https://bugs.php.net/bug.php?id=74603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628
https://security.gentoo.org/glsa/201709-21
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
libapache2-mod-php5 CVE-2017-9224 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/101244
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224
https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b
https://github.com/kkos/oniguruma/issues/57
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
libapache2-mod-php5 CVE-2017-9226 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/101244
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226
https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
https://github.com/kkos/oniguruma/issues/55
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
libapache2-mod-php5 CVE-2017-9227 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/100538
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227
https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814
https://github.com/kkos/oniguruma/issues/58
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
libapache2-mod-php5 CVE-2017-9228 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228
https://github.com/kkos/oniguruma/commit/3b63d12038c8d8fc278e81c942fa9bec7c704c8b
https://github.com/kkos/oniguruma/issues/60
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
libapache2-mod-php5 CVE-2017-9229 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229
https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d
https://github.com/kkos/oniguruma/issues/59
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
libapache2-mod-php5 CVE-2018-10545 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104022
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10545
https://bugs.php.net/bug.php?id=75605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10545
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
libapache2-mod-php5 CVE-2018-10546 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104019
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10546
https://bugs.php.net/bug.php?id=76249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://usn.ubuntu.com/3646-1/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
libapache2-mod-php5 CVE-2018-10547 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10547
https://bugs.php.net/bug.php?id=76129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547
https://linux.oracle.com/cve/CVE-2018-10547.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
libapache2-mod-php5 CVE-2018-10548 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104019
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10548
https://bugs.php.net/bug.php?id=76248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
https://www.tenable.com/security/tns-2019-07
libapache2-mod-php5 CVE-2018-14883 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104871
https://access.redhat.com/security/cve/CVE-2018-14883
https://bugs.php.net/bug.php?id=76423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883
https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html
https://security.netapp.com/advisory/ntap-20181107-0003/
https://ubuntu.com/security/notices/USN-3766-1
https://ubuntu.com/security/notices/USN-3766-2
https://usn.ubuntu.com/3766-1/
https://usn.ubuntu.com/3766-2/
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2018-12
libapache2-mod-php5 CVE-2018-17082 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-17082
https://bugs.php.net/bug.php?id=76582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082
https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e
https://lists.debian.org/debian-lts-announce/2018/09/msg00020.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180924-0001/
https://ubuntu.com/security/notices/USN-3766-1
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2019-07
libapache2-mod-php5 CVE-2018-5712 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/102742
http://www.securityfocus.com/bid/104020
http://www.securitytracker.com/id/1040363
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-5712
https://bugs.php.net/bug.php?id=74782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712
https://linux.oracle.com/cve/CVE-2018-5712.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html
https://ubuntu.com/security/notices/USN-3566-1
https://ubuntu.com/security/notices/USN-3600-1
https://ubuntu.com/security/notices/USN-3600-2
https://usn.ubuntu.com/3566-1/
https://usn.ubuntu.com/3600-1/
https://usn.ubuntu.com/3600-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
libapache2-mod-php5 CVE-2018-7584 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.24
Expand...http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/103204
http://www.securitytracker.com/id/1041607
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-7584
https://bugs.php.net/bug.php?id=75981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584
https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
https://linux.oracle.com/cve/CVE-2018-7584.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://ubuntu.com/security/notices/USN-3600-1
https://ubuntu.com/security/notices/USN-3600-2
https://usn.ubuntu.com/3600-1/
https://usn.ubuntu.com/3600-2/
https://www.debian.org/security/2018/dsa-4240
https://www.exploit-db.com/exploits/44846/
https://www.tenable.com/security/tns-2018-03
https://www.tenable.com/security/tns-2018-12
libapache2-mod-php5 CVE-2019-9020 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9020
https://bugs.php.net/bug.php?id=77242
https://bugs.php.net/bug.php?id=77249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020
https://linux.oracle.com/cve/CVE-2019-9020.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
libapache2-mod-php5 CVE-2019-9021 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/106747
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9021
https://bugs.php.net/bug.php?id=77247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9021
https://linux.oracle.com/cve/CVE-2019-9021.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
libapache2-mod-php5 CVE-2019-9022 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9022
https://bugs.php.net/bug.php?id=77369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9022
https://linux.oracle.com/cve/CVE-2019-9022.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4398
https://www.tenable.com/security/tns-2019-07
libapache2-mod-php5 CVE-2019-9023 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9023
https://bugs.php.net/bug.php?id=77370
https://bugs.php.net/bug.php?id=77371
https://bugs.php.net/bug.php?id=77381
https://bugs.php.net/bug.php?id=77382
https://bugs.php.net/bug.php?id=77385
https://bugs.php.net/bug.php?id=77394
https://bugs.php.net/bug.php?id=77418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023
https://linux.oracle.com/cve/CVE-2019-9023.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://support.f5.com/csp/article/K06372014
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
libapache2-mod-php5 CVE-2019-9024 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9024
https://bugs.php.net/bug.php?id=77380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024
https://linux.oracle.com/cve/CVE-2019-9024.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
libapache2-mod-php5 CVE-2019-9638 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9638
https://bugs.php.net/bug.php?id=77563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638
https://linux.oracle.com/cve/CVE-2019-9638.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
libapache2-mod-php5 CVE-2019-9639 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9639
https://bugs.php.net/bug.php?id=77659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639
https://linux.oracle.com/cve/CVE-2019-9639.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
libapache2-mod-php5 CVE-2019-9640 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9640
https://bugs.php.net/bug.php?id=77540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640
https://linux.oracle.com/cve/CVE-2019-9640.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
libapache2-mod-php5 CVE-2019-9641 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2019-9641
https://bugs.php.net/bug.php?id=77509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
libapache2-mod-php5 CVE-2014-9767 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/16/20
http://www.securityfocus.com/bid/76652
http://www.securitytracker.com/id/1035311
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2014-9767
https://bugs.php.net/bug.php?id=67996
https://bugs.php.net/bug.php?id=70350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9767
https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686
https://ubuntu.com/security/notices/USN-2952-1
libapache2-mod-php5 CVE-2014-9912 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://www.openwall.com/lists/oss-security/2016/11/25/1
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/68549
https://access.redhat.com/security/cve/CVE-2014-9912
https://bugs.php.net/bug.php?id=67397
https://bugzilla.redhat.com/show_bug.cgi?id=1383569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9912
https://marc.info/?l=oss-security&m=148003512008712&w=2
https://ubuntu.com/security/notices/USN-3196-1
libapache2-mod-php5 CVE-2015-4116 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=1cbd25ca15383394ffa9ee8601c5de4c0f2f90e1
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
https://access.redhat.com/security/cve/CVE-2015-4116
https://bugs.php.net/bug.php?id=69737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116
https://ubuntu.com/security/notices/USN-3045-1
https://www.htbridge.com/advisory/HTB23262
libapache2-mod-php5 CVE-2015-8865 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://bugs.gw.com/view.php?id=522
http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85802
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8865
https://bugs.php.net/bug.php?id=71527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
libapache2-mod-php5 CVE-2015-8873 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=4d2278143a08b7522de9471d0f014d7357c28fea
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
https://access.redhat.com/security/cve/CVE-2015-8873
https://bugs.php.net/bug.php?id=69793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8873
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2015-8994 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://marc.info/?l=php-internals&m=147876797317925&w=2
http://marc.info/?l=php-internals&m=147921016724565&w=2
http://openwall.com/lists/oss-security/2017/02/28/1
http://seclists.org/oss-sec/2016/q4/343
http://seclists.org/oss-sec/2017/q1/520
https://access.redhat.com/security/cve/CVE-2015-8994
https://bugs.php.net/bug.php?id=69090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8994
https://ma.ttias.be/a-better-way-to-run-php-fpm/
https://ubuntu.com/security/notices/USN-3382-1
libapache2-mod-php5 CVE-2016-10158 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95764
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10158
https://bugs.php.net/bug.php?id=73737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158
https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
libapache2-mod-php5 CVE-2016-10159 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95774
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10159
https://bugs.php.net/bug.php?id=73764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159
https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
libapache2-mod-php5 CVE-2016-10161 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95768
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10161
https://bugs.php.net/bug.php?id=73825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161
https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
libapache2-mod-php5 CVE-2016-10712 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.24
Expand...https://access.redhat.com/security/cve/CVE-2016-10712
https://bugs.php.net/bug.php?id=71323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10712
https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5
https://ubuntu.com/security/notices/USN-3566-2
https://ubuntu.com/security/notices/USN-3600-1
https://usn.ubuntu.com/3566-2/
https://usn.ubuntu.com/3600-1/
libapache2-mod-php5 CVE-2016-1903 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/01/14/8
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/79916
http://www.securitytracker.com/id/1034608
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-1903
https://bugs.php.net/bug.php?id=70976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-2952-1
libapache2-mod-php5 CVE-2016-3142 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/10/5
http://www.openwall.com/lists/oss-security/2016/03/13/2
http://www.securitytracker.com/id/1035255
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3142
https://bugs.php.net/bug.php?id=71498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142
https://git.php.net/?p=php-src.git;a=commit;h=a6fdc5bb27b20d889de0cd29318b3968aabb57bd
https://php.net/ChangeLog-5.php
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
libapache2-mod-php5 CVE-2016-4537 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90173
https://access.redhat.com/security/cve/CVE-2016-4537
https://bugs.php.net/bug.php?id=72093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537
https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
libapache2-mod-php5 CVE-2016-4540 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90172
https://access.redhat.com/security/cve/CVE-2016-4540
https://bugs.php.net/bug.php?id=72061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540
https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
libapache2-mod-php5 CVE-2016-4541 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90172
https://access.redhat.com/security/cve/CVE-2016-4541
https://bugs.php.net/bug.php?id=72061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541
https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
libapache2-mod-php5 CVE-2016-4542 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4542
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
libapache2-mod-php5 CVE-2016-4543 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4543
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
libapache2-mod-php5 CVE-2016-4544 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4544
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
libapache2-mod-php5 CVE-2016-5093 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90946
https://access.redhat.com/security/cve/CVE-2016-5093
https://bugs.php.net/bug.php?id=72241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
https://github.com/php/php-src/commit/97eff7eb57fc2320c267a949cffd622c38712484?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-5094 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90857
https://access.redhat.com/security/cve/CVE-2016-5094
https://bugs.php.net/bug.php?id=72135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
https://github.com/php/php-src/commit/0da8b8b801f9276359262f1ef8274c7812d3dfda?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-5095 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/92144
https://access.redhat.com/security/cve/CVE-2016-5095
https://bugs.php.net/bug.php?id=72135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095
https://gist.github.com/8ef775c117d84ff15185953990a28576
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-5096 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90861
https://access.redhat.com/security/cve/CVE-2016-5096
https://bugs.php.net/bug.php?id=72114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
https://github.com/php/php-src/commit/abd159cce48f3e34f08e4751c568e09677d5ec9c?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-5114 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://seclists.org/bugtraq/2016/Jan/117
http://www.openwall.com/lists/oss-security/2016/02/02/4
http://www.openwall.com/lists/oss-security/2016/05/29/1
http://www.search-lab.hu/about-us/news/111-some-unusual-vulnerabilities-in-the-php-engine
https://access.redhat.com/security/cve/CVE-2016-5114
https://bugs.php.net/bug.php?id=70755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-5771 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91401
https://access.redhat.com/security/cve/CVE-2016-5771
https://bugs.php.net/bug.php?id=72433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
libapache2-mod-php5 CVE-2016-5773 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91397
https://access.redhat.com/security/cve/CVE-2016-5773
https://bugs.php.net/bug.php?id=72434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
https://www.evonide.com/breaking-phps-garbage-collection-and-unserialize/
libapache2-mod-php5 CVE-2016-7124 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92756
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7124
https://bugs.php.net/bug.php?id=72663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124
https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-7125 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92552
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7125
https://bugs.php.net/bug.php?id=72681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125
https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-7128 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92564
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7128
https://bugs.php.net/bug.php?id=72627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128
https://github.com/php/php-src/commit/6dbb1ee46b5f4725cc6519abf91e512a2a10dfed?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-7416 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93008
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7416
https://bugs.php.net/bug.php?id=73007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416
https://github.com/php/php-src/commit/6d55ba265637d6adf0ba7e9c9ef11187d1ec2f5b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-7418 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93011
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7418
https://bugs.php.net/bug.php?id=73065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418
https://github.com/php/php-src/commit/c4cca4c20e75359c9a13a1f9a36cb7b4e9601d29?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2016-9137 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f
http://www.debian.org/security/2016/dsa-3698
http://www.openwall.com/lists/oss-security/2016/10/18/1
http://www.openwall.com/lists/oss-security/2016/11/01/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93577
https://access.redhat.com/security/cve/CVE-2016-9137
https://bugs.php.net/bug.php?id=73147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2016-19
libapache2-mod-php5 CVE-2017-11362 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11362
https://bugs.php.net/bug.php?id=73473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11362
https://security.gentoo.org/glsa/201709-21
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3566-2
https://usn.ubuntu.com/3566-2/
libapache2-mod-php5 CVE-2017-12933 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99490
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-12933
https://bugs.php.net/bug.php?id=74111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933
https://ubuntu.com/security/notices/USN-3566-1
https://ubuntu.com/security/notices/USN-3566-2
https://usn.ubuntu.com/3566-1/
https://usn.ubuntu.com/3566-2/
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
libapache2-mod-php5 CVE-2017-16642 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/101745
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2017-16642
https://bugs.php.net/bug.php?id=75055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642
https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
https://security.netapp.com/advisory/ntap-20181123-0001/
https://ubuntu.com/security/notices/USN-3566-1
https://usn.ubuntu.com/3566-1/
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.exploit-db.com/exploits/43133/
libapache2-mod-php5 CVE-2018-14851 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104871
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-14851
https://bugs.php.net/bug.php?id=76557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851
https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html
https://security.netapp.com/advisory/ntap-20181107-0003/
https://ubuntu.com/security/notices/USN-3766-1
https://ubuntu.com/security/notices/USN-3766-2
https://usn.ubuntu.com/3766-1/
https://usn.ubuntu.com/3766-2/
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2018-12
libapache2-mod-php5 CVE-2019-9637 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9637
https://bugs.php.net/bug.php?id=77630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637
https://linux.oracle.com/cve/CVE-2019-9637.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://support.f5.com/csp/article/K53825211
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
https://www.tenable.com/security/tns-2019-07
libapache2-mod-php5 CVE-2019-9675 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://php.net/ChangeLog-7.php
https://access.redhat.com/security/cve/CVE-2019-9675
https://bugs.php.net/bug.php?id=77586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
libapt-inst1.5 CVE-2016-1252 HIGH 1.0.1ubuntu2.10 1.0.1ubuntu2.17
Expand...http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html
http://www.ubuntu.com/usn/USN-3156-1
https://bugs.chromium.org/p/project-zero/issues/detail?id=1020
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1252
https://ubuntu.com/security/notices/USN-3156-1
https://www.debian.org/security/2016/dsa-3733
https://www.exploit-db.com/exploits/40916/
libapt-inst1.5 CVE-2019-3462 HIGH 1.0.1ubuntu2.10 1.0.1ubuntu2.19
Expand...http://www.securityfocus.com/bid/106690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3462
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html
https://security.netapp.com/advisory/ntap-20190125-0002/
https://ubuntu.com/security/notices/USN-3863-1
https://ubuntu.com/security/notices/USN-3863-2
https://usn.ubuntu.com/3863-1/
https://usn.ubuntu.com/3863-2/
https://www.debian.org/security/2019/dsa-4371
libapt-pkg4.12 CVE-2016-1252 HIGH 1.0.1ubuntu2.10 1.0.1ubuntu2.17
Expand...http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html
http://www.ubuntu.com/usn/USN-3156-1
https://bugs.chromium.org/p/project-zero/issues/detail?id=1020
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1252
https://ubuntu.com/security/notices/USN-3156-1
https://www.debian.org/security/2016/dsa-3733
https://www.exploit-db.com/exploits/40916/
libapt-pkg4.12 CVE-2019-3462 HIGH 1.0.1ubuntu2.10 1.0.1ubuntu2.19
Expand...http://www.securityfocus.com/bid/106690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3462
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html
https://security.netapp.com/advisory/ntap-20190125-0002/
https://ubuntu.com/security/notices/USN-3863-1
https://ubuntu.com/security/notices/USN-3863-2
https://usn.ubuntu.com/3863-1/
https://usn.ubuntu.com/3863-2/
https://www.debian.org/security/2019/dsa-4371
libasn1-8-heimdal CVE-2017-11103 MEDIUM 1.6~git20131207+dfsg-1ubuntu1.1 1.6~git20131207+dfsg-1ubuntu1.2
Expand...http://www.debian.org/security/2017/dsa-3912
http://www.h5l.org/advisories.html?show=2017-07-11
http://www.securityfocus.com/bid/99551
http://www.securitytracker.com/id/1038876
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-11103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
https://orpheus-lyre.info/
https://support.apple.com/HT208112
https://support.apple.com/HT208144
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3353-1
https://ubuntu.com/security/notices/USN-3353-2
https://ubuntu.com/security/notices/USN-3353-3
https://ubuntu.com/security/notices/USN-3353-4
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc
https://www.orpheus-lyre.info/
https://www.samba.org/samba/security/CVE-2017-11103.html
libc-bin CVE-2015-7547 HIGH 2.19-0ubuntu6.6 2.19-0ubuntu6.7
Expand...http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html
http://marc.info/?l=bugtraq&m=145596041017029&w=2
http://marc.info/?l=bugtraq&m=145672440608228&w=2
http://marc.info/?l=bugtraq&m=145690841819314&w=2
http://marc.info/?l=bugtraq&m=145857691004892&w=2
http://marc.info/?l=bugtraq&m=146161017210491&w=2
http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://rhn.redhat.com/errata/RHSA-2016-0175.html
http://rhn.redhat.com/errata/RHSA-2016-0176.html
http://rhn.redhat.com/errata/RHSA-2016-0225.html
http://rhn.redhat.com/errata/RHSA-2016-0277.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://seclists.org/fulldisclosure/2021/Sep/0
http://support.citrix.com/article/CTX206991
http://ubuntu.com/usn/usn-2900-1
http://www.debian.org/security/2016/dsa-3480
http://www.debian.org/security/2016/dsa-3481
http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/83265
http://www.securitytracker.com/id/1035020
http://www.vmware.com/security/advisories/VMSA-2016-0002.html
https://access.redhat.com/articles/2161461
https://access.redhat.com/security/cve/CVE-2015-7547
https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
https://bto.bluecoat.com/security-advisory/sa114
https://bugzilla.redhat.com/show_bug.cgi?id=1293532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161
https://kc.mcafee.com/corporate/index?page=content&id=SB10150
https://linux.oracle.com/cve/CVE-2015-7547.html
https://linux.oracle.com/errata/ELSA-2016-0176.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201602-02
https://security.netapp.com/advisory/ntap-20160217-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=18665
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html
https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html
https://support.lenovo.com/us/en/product_security/len_5450
https://ubuntu.com/security/notices/USN-2900-1
https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17
https://www.exploit-db.com/exploits/39454/
https://www.exploit-db.com/exploits/40339/
https://www.kb.cert.org/vuls/id/457759
https://www.tenable.com/security/research/tra-2017-08
libc-bin CVE-2018-1000001 HIGH 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://seclists.org/oss-sec/2018/q1/38
http://www.openwall.com/lists/oss-security/2018/01/11/5
http://www.securityfocus.com/bid/102525
http://www.securitytracker.com/id/1040162
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2018-1000001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
https://linux.oracle.com/cve/CVE-2018-1000001.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://lists.samba.org/archive/rsync/2018-February/031478.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=18203
https://ubuntu.com/security/notices/USN-3534-1
https://ubuntu.com/security/notices/USN-3536-1
https://usn.ubuntu.com/3534-1/
https://usn.ubuntu.com/3536-1/
https://www.exploit-db.com/exploits/43775/
https://www.exploit-db.com/exploits/44889/
https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
libc-bin CVE-2015-5277 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://rhn.redhat.com/errata/RHSA-2015-2172.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securityfocus.com/bid/78092
http://www.securitytracker.com/id/1034196
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/security/cve/CVE-2015-5277
https://bugzilla.redhat.com/show_bug.cgi?id=1262914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277
https://linux.oracle.com/cve/CVE-2015-5277.html
https://linux.oracle.com/errata/ELSA-2015-2172.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=17079
https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html
https://ubuntu.com/security/notices/USN-2985-1
libc-bin CVE-2015-8982 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
libc-bin CVE-2015-8983 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
libc-bin CVE-2015-8984 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
libc-bin CVE-2016-2856 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403
http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html
http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/
http://www.openwall.com/lists/oss-security/2016/02/23/3
http://www.openwall.com/lists/oss-security/2016/03/07/2
http://www.securityfocus.com/bid/84601
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856
https://ubuntu.com/security/notices/USN-2985-1
libc-bin CVE-2017-1000366 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.13
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.debian.org/security/2017/dsa-3887
http://www.securityfocus.com/bid/99127
http://www.securitytracker.com/id/1038712
https://access.redhat.com/errata/RHSA-2017:1479
https://access.redhat.com/errata/RHSA-2017:1480
https://access.redhat.com/errata/RHSA-2017:1481
https://access.redhat.com/errata/RHSA-2017:1567
https://access.redhat.com/errata/RHSA-2017:1712
https://access.redhat.com/security/cve/CVE-2017-1000366
https://access.redhat.com/security/vulnerabilities/stackguard
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366
https://kc.mcafee.com/corporate/index?page=content&id=SB10205
https://linux.oracle.com/cve/CVE-2017-1000366.html
https://linux.oracle.com/errata/ELSA-2017-1481.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201706-19
https://ubuntu.com/security/notices/USN-3323-1
https://ubuntu.com/security/notices/USN-3323-2
https://www.exploit-db.com/exploits/42274/
https://www.exploit-db.com/exploits/42275/
https://www.exploit-db.com/exploits/42276/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
https://www.suse.com/security/cve/CVE-2017-1000366/
https://www.suse.com/support/kb/doc/?id=7020973
libc-bin CVE-2013-2207 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://secunia.com/advisories/55113
http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/security/cve/CVE-2013-2207
https://bugzilla.redhat.com/show_bug.cgi?id=976408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=15755
https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html
https://ubuntu.com/security/notices/USN-2985-1
libc-bin CVE-2014-8121 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://rhn.redhat.com/errata/RHSA-2015-0327.html
http://www.debian.org/security/2016/dsa-3480
http://www.securityfocus.com/bid/73038
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/security/cve/CVE-2014-8121
https://bugzilla.redhat.com/show_bug.cgi?id=1165192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
https://linux.oracle.com/cve/CVE-2014-8121.html
https://linux.oracle.com/errata/ELSA-2015-0327.html
https://security.gentoo.org/glsa/201602-02
https://sourceware.org/ml/libc-alpha/2015-02/msg00617.html
https://ubuntu.com/security/notices/USN-2985-1
libc-bin CVE-2015-1781 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://www.debian.org/security/2016/dsa-3480
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securityfocus.com/bid/74255
http://www.securitytracker.com/id/1032178
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/security/cve/CVE-2015-1781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
https://linux.oracle.com/cve/CVE-2015-1781.html
https://linux.oracle.com/errata/ELSA-2015-2199.html
https://rhn.redhat.com/errata/RHSA-2015-0863.html
https://security.gentoo.org/glsa/201602-02
https://sourceware.org/bugzilla/show_bug.cgi?id=18287
https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386
https://ubuntu.com/security/notices/USN-2985-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
libc-bin CVE-2015-8776 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://rhn.redhat.com/errata/RHSA-2017-0680.html
http://www.debian.org/security/2016/dsa-3480
http://www.debian.org/security/2016/dsa-3481
http://www.openwall.com/lists/oss-security/2016/01/19/11
http://www.openwall.com/lists/oss-security/2016/01/20/1
http://www.securityfocus.com/bid/83277
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/errata/RHSA-2017:1916
https://access.redhat.com/security/cve/CVE-2015-8776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
https://linux.oracle.com/cve/CVE-2015-8776.html
https://linux.oracle.com/errata/ELSA-2017-1916.html
https://security.gentoo.org/glsa/201602-02
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=18985
https://ubuntu.com/security/notices/USN-2985-1
https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
libc-bin CVE-2015-8777 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://www.debian.org/security/2016/dsa-3480
http://www.openwall.com/lists/oss-security/2015/09/05/8
http://www.openwall.com/lists/oss-security/2016/01/20/1
http://www.securityfocus.com/bid/81469
http://www.securitytracker.com/id/1034811
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/errata/RHSA-2017:1916
https://access.redhat.com/security/cve/CVE-2015-8777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
https://linux.oracle.com/cve/CVE-2015-8777.html
https://linux.oracle.com/errata/ELSA-2017-1916.html
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=18928
https://ubuntu.com/security/notices/USN-2985-1
libc-bin CVE-2015-8778 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://rhn.redhat.com/errata/RHSA-2017-0680.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.debian.org/security/2016/dsa-3480
http://www.debian.org/security/2016/dsa-3481
http://www.openwall.com/lists/oss-security/2016/01/19/11
http://www.openwall.com/lists/oss-security/2016/01/20/1
http://www.securityfocus.com/bid/83275
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/errata/RHSA-2017:1916
https://access.redhat.com/security/cve/CVE-2015-8778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
https://linux.oracle.com/cve/CVE-2015-8778.html
https://linux.oracle.com/errata/ELSA-2017-1916.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201602-02
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=18240
https://ubuntu.com/security/notices/USN-2985-1
https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
libc-bin CVE-2015-8779 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://rhn.redhat.com/errata/RHSA-2017-0680.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.debian.org/security/2016/dsa-3480
http://www.debian.org/security/2016/dsa-3481
http://www.openwall.com/lists/oss-security/2016/01/19/11
http://www.openwall.com/lists/oss-security/2016/01/20/1
http://www.securityfocus.com/bid/82244
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/errata/RHSA-2017:1916
https://access.redhat.com/security/cve/CVE-2015-8779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
https://linux.oracle.com/cve/CVE-2015-8779.html
https://linux.oracle.com/errata/ELSA-2017-1916.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201602-02
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=17905
https://ubuntu.com/security/notices/USN-2985-1
https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
libc-bin CVE-2016-1234 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
libc-bin CVE-2016-3075 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://rhn.redhat.com/errata/RHSA-2016-2573.html
http://www.securityfocus.com/bid/85732
http://www.ubuntu.com/usn/USN-2985-1
https://access.redhat.com/security/cve/CVE-2016-3075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075
https://linux.oracle.com/cve/CVE-2016-3075.html
https://linux.oracle.com/errata/ELSA-2016-3638.html
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19879
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=317b199b4aff8cfa27f2302ab404d2bb5032b9a4
https://ubuntu.com/security/notices/USN-2985-1
libc-bin CVE-2016-3706 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
http://www.securityfocus.com/bid/88440
https://access.redhat.com/security/cve/CVE-2016-3706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20010
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3239-3
libc-bin CVE-2016-4429 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
libc-bin CVE-2016-6323 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://lists.opensuse.org/opensuse-updates/2016-10/msg00009.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.openwall.com/lists/oss-security/2016/08/18/12
http://www.securityfocus.com/bid/92532
https://access.redhat.com/security/cve/CVE-2016-6323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KTXSOVCRDGBIB4WCIDAGYYUBESXZ4IGK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVWSAZVBTLALXF4SCBPDV3FY6J22DXLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WO7IMEYWZ2WTXGGMZBWWSDCUMFN63XOB/
https://security.gentoo.org/glsa/201706-19
https://sourceware.org/bugzilla/show_bug.cgi?id=20435
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=9e2ff6c9cc54c0b4402b8d49e4abe7000fde7617
https://ubuntu.com/security/notices/USN-3239-1
libc-bin CVE-2017-1000408 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://seclists.org/oss-sec/2017/q4/385
http://www.openwall.com/lists/oss-security/2017/12/11/4
http://www.openwall.com/lists/oss-security/2019/06/27/7
http://www.openwall.com/lists/oss-security/2019/06/28/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
https://access.redhat.com/security/cve/CVE-2017-1000408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408
https://security.netapp.com/advisory/ntap-20190404-0003/
https://ubuntu.com/security/notices/USN-3534-1
https://www.exploit-db.com/exploits/43331/
libc-bin CVE-2017-1000409 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://seclists.org/oss-sec/2017/q4/385
http://www.openwall.com/lists/oss-security/2017/12/11/4
https://access.redhat.com/security/cve/CVE-2017-1000409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409
https://security.netapp.com/advisory/ntap-20190404-0003/
https://ubuntu.com/security/notices/USN-3534-1
https://www.exploit-db.com/exploits/43331/
libc-bin CVE-2017-15670 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://www.securityfocus.com/bid/101521
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/errata/RHSA-2018:1879
https://access.redhat.com/security/cve/CVE-2017-15670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
https://linux.oracle.com/cve/CVE-2017-15670.html
https://linux.oracle.com/errata/ELSA-2018-1879.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22320
https://ubuntu.com/security/notices/USN-3534-1
libc-bin CVE-2017-15804 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://www.securityfocus.com/bid/101535
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/errata/RHSA-2018:1879
https://access.redhat.com/security/cve/CVE-2017-15804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804
https://linux.oracle.com/cve/CVE-2017-15804.html
https://linux.oracle.com/errata/ELSA-2018-1879.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22332
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8
https://ubuntu.com/security/notices/USN-3534-1
libc-bin CVE-2017-16997 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://www.securityfocus.com/bid/102228
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2017-16997
https://bugs.debian.org/884615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997
https://linux.oracle.com/cve/CVE-2017-16997.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22625
https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html
https://ubuntu.com/security/notices/USN-3534-1
libc6 CVE-2015-7547 HIGH 2.19-0ubuntu6.6 2.19-0ubuntu6.7
Expand...http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html
http://marc.info/?l=bugtraq&m=145596041017029&w=2
http://marc.info/?l=bugtraq&m=145672440608228&w=2
http://marc.info/?l=bugtraq&m=145690841819314&w=2
http://marc.info/?l=bugtraq&m=145857691004892&w=2
http://marc.info/?l=bugtraq&m=146161017210491&w=2
http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://rhn.redhat.com/errata/RHSA-2016-0175.html
http://rhn.redhat.com/errata/RHSA-2016-0176.html
http://rhn.redhat.com/errata/RHSA-2016-0225.html
http://rhn.redhat.com/errata/RHSA-2016-0277.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://seclists.org/fulldisclosure/2021/Sep/0
http://support.citrix.com/article/CTX206991
http://ubuntu.com/usn/usn-2900-1
http://www.debian.org/security/2016/dsa-3480
http://www.debian.org/security/2016/dsa-3481
http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/83265
http://www.securitytracker.com/id/1035020
http://www.vmware.com/security/advisories/VMSA-2016-0002.html
https://access.redhat.com/articles/2161461
https://access.redhat.com/security/cve/CVE-2015-7547
https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
https://bto.bluecoat.com/security-advisory/sa114
https://bugzilla.redhat.com/show_bug.cgi?id=1293532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161
https://kc.mcafee.com/corporate/index?page=content&id=SB10150
https://linux.oracle.com/cve/CVE-2015-7547.html
https://linux.oracle.com/errata/ELSA-2016-0176.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201602-02
https://security.netapp.com/advisory/ntap-20160217-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=18665
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html
https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html
https://support.lenovo.com/us/en/product_security/len_5450
https://ubuntu.com/security/notices/USN-2900-1
https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17
https://www.exploit-db.com/exploits/39454/
https://www.exploit-db.com/exploits/40339/
https://www.kb.cert.org/vuls/id/457759
https://www.tenable.com/security/research/tra-2017-08
libc6 CVE-2018-1000001 HIGH 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://seclists.org/oss-sec/2018/q1/38
http://www.openwall.com/lists/oss-security/2018/01/11/5
http://www.securityfocus.com/bid/102525
http://www.securitytracker.com/id/1040162
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2018-1000001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
https://linux.oracle.com/cve/CVE-2018-1000001.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://lists.samba.org/archive/rsync/2018-February/031478.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=18203
https://ubuntu.com/security/notices/USN-3534-1
https://ubuntu.com/security/notices/USN-3536-1
https://usn.ubuntu.com/3534-1/
https://usn.ubuntu.com/3536-1/
https://www.exploit-db.com/exploits/43775/
https://www.exploit-db.com/exploits/44889/
https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
libc6 CVE-2015-5277 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://rhn.redhat.com/errata/RHSA-2015-2172.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securityfocus.com/bid/78092
http://www.securitytracker.com/id/1034196
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/security/cve/CVE-2015-5277
https://bugzilla.redhat.com/show_bug.cgi?id=1262914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277
https://linux.oracle.com/cve/CVE-2015-5277.html
https://linux.oracle.com/errata/ELSA-2015-2172.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=17079
https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html
https://ubuntu.com/security/notices/USN-2985-1
libc6 CVE-2015-8982 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
libc6 CVE-2015-8983 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
libc6 CVE-2015-8984 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
libc6 CVE-2016-2856 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403
http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html
http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/
http://www.openwall.com/lists/oss-security/2016/02/23/3
http://www.openwall.com/lists/oss-security/2016/03/07/2
http://www.securityfocus.com/bid/84601
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856
https://ubuntu.com/security/notices/USN-2985-1
libc6 CVE-2017-1000366 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.13
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.debian.org/security/2017/dsa-3887
http://www.securityfocus.com/bid/99127
http://www.securitytracker.com/id/1038712
https://access.redhat.com/errata/RHSA-2017:1479
https://access.redhat.com/errata/RHSA-2017:1480
https://access.redhat.com/errata/RHSA-2017:1481
https://access.redhat.com/errata/RHSA-2017:1567
https://access.redhat.com/errata/RHSA-2017:1712
https://access.redhat.com/security/cve/CVE-2017-1000366
https://access.redhat.com/security/vulnerabilities/stackguard
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366
https://kc.mcafee.com/corporate/index?page=content&id=SB10205
https://linux.oracle.com/cve/CVE-2017-1000366.html
https://linux.oracle.com/errata/ELSA-2017-1481.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201706-19
https://ubuntu.com/security/notices/USN-3323-1
https://ubuntu.com/security/notices/USN-3323-2
https://www.exploit-db.com/exploits/42274/
https://www.exploit-db.com/exploits/42275/
https://www.exploit-db.com/exploits/42276/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
https://www.suse.com/security/cve/CVE-2017-1000366/
https://www.suse.com/support/kb/doc/?id=7020973
libc6 CVE-2013-2207 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://secunia.com/advisories/55113
http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/security/cve/CVE-2013-2207
https://bugzilla.redhat.com/show_bug.cgi?id=976408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=15755
https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html
https://ubuntu.com/security/notices/USN-2985-1
libc6 CVE-2014-8121 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://rhn.redhat.com/errata/RHSA-2015-0327.html
http://www.debian.org/security/2016/dsa-3480
http://www.securityfocus.com/bid/73038
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/security/cve/CVE-2014-8121
https://bugzilla.redhat.com/show_bug.cgi?id=1165192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
https://linux.oracle.com/cve/CVE-2014-8121.html
https://linux.oracle.com/errata/ELSA-2015-0327.html
https://security.gentoo.org/glsa/201602-02
https://sourceware.org/ml/libc-alpha/2015-02/msg00617.html
https://ubuntu.com/security/notices/USN-2985-1
libc6 CVE-2015-1781 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://www.debian.org/security/2016/dsa-3480
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securityfocus.com/bid/74255
http://www.securitytracker.com/id/1032178
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/security/cve/CVE-2015-1781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
https://linux.oracle.com/cve/CVE-2015-1781.html
https://linux.oracle.com/errata/ELSA-2015-2199.html
https://rhn.redhat.com/errata/RHSA-2015-0863.html
https://security.gentoo.org/glsa/201602-02
https://sourceware.org/bugzilla/show_bug.cgi?id=18287
https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386
https://ubuntu.com/security/notices/USN-2985-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
libc6 CVE-2015-8776 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://rhn.redhat.com/errata/RHSA-2017-0680.html
http://www.debian.org/security/2016/dsa-3480
http://www.debian.org/security/2016/dsa-3481
http://www.openwall.com/lists/oss-security/2016/01/19/11
http://www.openwall.com/lists/oss-security/2016/01/20/1
http://www.securityfocus.com/bid/83277
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/errata/RHSA-2017:1916
https://access.redhat.com/security/cve/CVE-2015-8776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
https://linux.oracle.com/cve/CVE-2015-8776.html
https://linux.oracle.com/errata/ELSA-2017-1916.html
https://security.gentoo.org/glsa/201602-02
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=18985
https://ubuntu.com/security/notices/USN-2985-1
https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
libc6 CVE-2015-8777 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://www.debian.org/security/2016/dsa-3480
http://www.openwall.com/lists/oss-security/2015/09/05/8
http://www.openwall.com/lists/oss-security/2016/01/20/1
http://www.securityfocus.com/bid/81469
http://www.securitytracker.com/id/1034811
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/errata/RHSA-2017:1916
https://access.redhat.com/security/cve/CVE-2015-8777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
https://linux.oracle.com/cve/CVE-2015-8777.html
https://linux.oracle.com/errata/ELSA-2017-1916.html
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=18928
https://ubuntu.com/security/notices/USN-2985-1
libc6 CVE-2015-8778 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://rhn.redhat.com/errata/RHSA-2017-0680.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.debian.org/security/2016/dsa-3480
http://www.debian.org/security/2016/dsa-3481
http://www.openwall.com/lists/oss-security/2016/01/19/11
http://www.openwall.com/lists/oss-security/2016/01/20/1
http://www.securityfocus.com/bid/83275
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/errata/RHSA-2017:1916
https://access.redhat.com/security/cve/CVE-2015-8778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
https://linux.oracle.com/cve/CVE-2015-8778.html
https://linux.oracle.com/errata/ELSA-2017-1916.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201602-02
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=18240
https://ubuntu.com/security/notices/USN-2985-1
https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
libc6 CVE-2015-8779 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://rhn.redhat.com/errata/RHSA-2017-0680.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.debian.org/security/2016/dsa-3480
http://www.debian.org/security/2016/dsa-3481
http://www.openwall.com/lists/oss-security/2016/01/19/11
http://www.openwall.com/lists/oss-security/2016/01/20/1
http://www.securityfocus.com/bid/82244
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/errata/RHSA-2017:1916
https://access.redhat.com/security/cve/CVE-2015-8779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
https://linux.oracle.com/cve/CVE-2015-8779.html
https://linux.oracle.com/errata/ELSA-2017-1916.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201602-02
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=17905
https://ubuntu.com/security/notices/USN-2985-1
https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
libc6 CVE-2016-1234 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
libc6 CVE-2016-3075 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://rhn.redhat.com/errata/RHSA-2016-2573.html
http://www.securityfocus.com/bid/85732
http://www.ubuntu.com/usn/USN-2985-1
https://access.redhat.com/security/cve/CVE-2016-3075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075
https://linux.oracle.com/cve/CVE-2016-3075.html
https://linux.oracle.com/errata/ELSA-2016-3638.html
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19879
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=317b199b4aff8cfa27f2302ab404d2bb5032b9a4
https://ubuntu.com/security/notices/USN-2985-1
libc6 CVE-2016-3706 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
http://www.securityfocus.com/bid/88440
https://access.redhat.com/security/cve/CVE-2016-3706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20010
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3239-3
libc6 CVE-2016-4429 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
libc6 CVE-2016-6323 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://lists.opensuse.org/opensuse-updates/2016-10/msg00009.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.openwall.com/lists/oss-security/2016/08/18/12
http://www.securityfocus.com/bid/92532
https://access.redhat.com/security/cve/CVE-2016-6323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KTXSOVCRDGBIB4WCIDAGYYUBESXZ4IGK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVWSAZVBTLALXF4SCBPDV3FY6J22DXLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WO7IMEYWZ2WTXGGMZBWWSDCUMFN63XOB/
https://security.gentoo.org/glsa/201706-19
https://sourceware.org/bugzilla/show_bug.cgi?id=20435
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=9e2ff6c9cc54c0b4402b8d49e4abe7000fde7617
https://ubuntu.com/security/notices/USN-3239-1
libc6 CVE-2017-1000408 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://seclists.org/oss-sec/2017/q4/385
http://www.openwall.com/lists/oss-security/2017/12/11/4
http://www.openwall.com/lists/oss-security/2019/06/27/7
http://www.openwall.com/lists/oss-security/2019/06/28/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
https://access.redhat.com/security/cve/CVE-2017-1000408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408
https://security.netapp.com/advisory/ntap-20190404-0003/
https://ubuntu.com/security/notices/USN-3534-1
https://www.exploit-db.com/exploits/43331/
libc6 CVE-2017-1000409 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://seclists.org/oss-sec/2017/q4/385
http://www.openwall.com/lists/oss-security/2017/12/11/4
https://access.redhat.com/security/cve/CVE-2017-1000409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409
https://security.netapp.com/advisory/ntap-20190404-0003/
https://ubuntu.com/security/notices/USN-3534-1
https://www.exploit-db.com/exploits/43331/
libc6 CVE-2017-15670 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://www.securityfocus.com/bid/101521
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/errata/RHSA-2018:1879
https://access.redhat.com/security/cve/CVE-2017-15670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
https://linux.oracle.com/cve/CVE-2017-15670.html
https://linux.oracle.com/errata/ELSA-2018-1879.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22320
https://ubuntu.com/security/notices/USN-3534-1
libc6 CVE-2017-15804 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://www.securityfocus.com/bid/101535
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/errata/RHSA-2018:1879
https://access.redhat.com/security/cve/CVE-2017-15804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804
https://linux.oracle.com/cve/CVE-2017-15804.html
https://linux.oracle.com/errata/ELSA-2018-1879.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22332
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8
https://ubuntu.com/security/notices/USN-3534-1
libc6 CVE-2017-16997 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://www.securityfocus.com/bid/102228
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2017-16997
https://bugs.debian.org/884615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997
https://linux.oracle.com/cve/CVE-2017-16997.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22625
https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html
https://ubuntu.com/security/notices/USN-3534-1
libcurl3-gnutls CVE-2016-5419 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.8
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html
http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html
http://rhn.redhat.com/errata/RHSA-2016-2575.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.debian.org/security/2016/dsa-3638
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/92292
http://www.securityfocus.com/bid/92319
http://www.securitytracker.com/id/1036538
http://www.securitytracker.com/id/1038341
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059
http://www.ubuntu.com/usn/USN-3048-1
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-5419
https://curl.haxx.se/docs/adv_20160803A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
https://linux.oracle.com/cve/CVE-2016-5419.html
https://linux.oracle.com/errata/ELSA-2016-2575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/
https://security.gentoo.org/glsa/201701-47
https://source.android.com/security/bulletin/2016-12-01.html
https://ubuntu.com/security/notices/USN-3048-1
https://www.tenable.com/security/tns-2016-18
libcurl3-gnutls CVE-2016-5420 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.8
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html
http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html
http://rhn.redhat.com/errata/RHSA-2016-2575.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.debian.org/security/2016/dsa-3638
http://www.openwall.com/lists/oss-security/2016/09/05/1
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/92309
http://www.securitytracker.com/id/1036537
http://www.securitytracker.com/id/1036739
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059
http://www.ubuntu.com/usn/USN-3048-1
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-5420
https://curl.haxx.se/docs/adv_20160803B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
https://linux.oracle.com/cve/CVE-2016-5420.html
https://linux.oracle.com/errata/ELSA-2016-2575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/
https://security.gentoo.org/glsa/201701-47
https://source.android.com/security/bulletin/2016-12-01.html
https://ubuntu.com/security/notices/USN-3048-1
https://www.tenable.com/security/tns-2016-18
libcurl3-gnutls CVE-2016-5421 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.8
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html
http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html
http://www.debian.org/security/2016/dsa-3638
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/92306
http://www.securitytracker.com/id/1036536
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059
http://www.ubuntu.com/usn/USN-3048-1
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-5421
https://curl.haxx.se/docs/adv_20160803C.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/
https://security.gentoo.org/glsa/201701-47
https://source.android.com/security/bulletin/2016-12-01.html
https://ubuntu.com/security/notices/USN-3048-1
https://www.tenable.com/security/tns-2016-18
libcurl3-gnutls CVE-2016-8615 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.10
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94096
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8615
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615
https://curl.haxx.se/CVE-2016-8615.patch
https://curl.haxx.se/docs/adv_20161102A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
https://linux.oracle.com/cve/CVE-2016-8615.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl3-gnutls CVE-2016-8617 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.10
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94097
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8617
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617
https://curl.haxx.se/CVE-2016-8617.patch
https://curl.haxx.se/docs/adv_20161102C.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
https://linux.oracle.com/cve/CVE-2016-8617.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl3-gnutls CVE-2016-8618 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.10
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94098
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8618
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618
https://curl.haxx.se/docs/adv_20161102D.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
https://linux.oracle.com/cve/CVE-2016-8618.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl3-gnutls CVE-2016-8619 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.10
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94100
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8619
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619
https://curl.haxx.se/CVE-2016-8619.patch
https://curl.haxx.se/docs/adv_20161102E.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
https://linux.oracle.com/cve/CVE-2016-8619.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl3-gnutls CVE-2016-8620 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.10
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94102
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8620
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620
https://curl.haxx.se/docs/adv_20161102F.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
https://linux.oracle.com/cve/CVE-2016-8620.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl3-gnutls CVE-2016-8622 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.10
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94105
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8622
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622
https://curl.haxx.se/docs/adv_20161102H.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
https://linux.oracle.com/cve/CVE-2016-8622.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl3-gnutls CVE-2016-8623 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.10
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94106
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623
https://curl.haxx.se/CVE-2016-8623.patch
https://curl.haxx.se/docs/adv_20161102I.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
https://linux.oracle.com/cve/CVE-2016-8623.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl3-gnutls CVE-2016-8624 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.10
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94103
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8624
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624
https://curl.haxx.se/docs/adv_20161102J.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
https://linux.oracle.com/cve/CVE-2016-8624.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl3-gnutls CVE-2017-1000254 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.11
Expand...http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/101115
http://www.securitytracker.com/id/1039509
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000254
https://curl.haxx.se/673d0cd8.patch
https://curl.haxx.se/docs/adv_20171004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201712-04
https://support.apple.com/HT208331
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
libcurl3-gnutls CVE-2017-1000257 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.12
Expand...http://www.debian.org/security/2017/dsa-4007
http://www.securityfocus.com/bid/101519
http://www.securitytracker.com/id/1039644
https://access.redhat.com/errata/RHSA-2017:3263
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000257
https://curl.haxx.se/docs/adv_20171023.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257
https://linux.oracle.com/cve/CVE-2017-1000257.html
https://linux.oracle.com/errata/ELSA-2017-3263.html
https://security.gentoo.org/glsa/201712-04
https://ubuntu.com/security/notices/USN-3441-2
https://ubuntu.com/security/notices/USN-3457-1
libcurl3-gnutls CVE-2017-8817 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.13
Expand...http://security.cucumberlinux.com/security/details.php?id=162
http://www.securityfocus.com/bid/102057
http://www.securitytracker.com/id/1039897
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-8817
https://curl.haxx.se/docs/adv_2017-ae72.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
https://security.gentoo.org/glsa/201712-04
https://ubuntu.com/security/notices/USN-3498-1
https://ubuntu.com/security/notices/USN-3498-2
https://www.debian.org/security/2017/dsa-4051
libcurl3-gnutls CVE-2018-1000007 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.14
Expand...http://www.openwall.com/lists/oss-security/2022/04/27/4
http://www.securitytracker.com/id/1040274
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3157
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/errata/RHSA-2020:0544
https://access.redhat.com/errata/RHSA-2020:0594
https://access.redhat.com/security/cve/CVE-2018-1000007
https://curl.haxx.se/docs/adv_2018-b3bf.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007
https://linux.oracle.com/cve/CVE-2018-1000007.html
https://linux.oracle.com/errata/ELSA-2018-3157.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00038.html
https://ubuntu.com/security/notices/USN-3554-1
https://ubuntu.com/security/notices/USN-3554-2
https://usn.ubuntu.com/3554-1/
https://usn.ubuntu.com/3554-2/
https://www.debian.org/security/2018/dsa-4098
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
libcurl3-gnutls CVE-2018-1000120 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.15
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103414
http://www.securitytracker.com/id/1040531
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3157
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/errata/RHSA-2020:0544
https://access.redhat.com/errata/RHSA-2020:0594
https://access.redhat.com/security/cve/CVE-2018-1000120
https://curl.haxx.se/docs/adv_2018-9cd6.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
https://linux.oracle.com/cve/CVE-2018-1000120.html
https://linux.oracle.com/errata/ELSA-2018-3157.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html
https://ubuntu.com/security/notices/USN-3598-1
https://ubuntu.com/security/notices/USN-3598-2
https://usn.ubuntu.com/3598-1/
https://usn.ubuntu.com/3598-2/
https://www.debian.org/security/2018/dsa-4136
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
libcurl3-gnutls CVE-2018-1000121 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.15
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103415
http://www.securitytracker.com/id/1040529
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3157
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2020:0544
https://access.redhat.com/errata/RHSA-2020:0594
https://access.redhat.com/security/cve/CVE-2018-1000121
https://curl.haxx.se/docs/adv_2018-97a2.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
https://linux.oracle.com/cve/CVE-2018-1000121.html
https://linux.oracle.com/errata/ELSA-2018-3157.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html
https://ubuntu.com/security/notices/USN-3598-1
https://ubuntu.com/security/notices/USN-3598-2
https://usn.ubuntu.com/3598-1/
https://usn.ubuntu.com/3598-2/
https://www.debian.org/security/2018/dsa-4136
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
libcurl3-gnutls CVE-2018-1000122 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.15
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103436
http://www.securitytracker.com/id/1040530
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3157
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/errata/RHSA-2020:0544
https://access.redhat.com/errata/RHSA-2020:0594
https://access.redhat.com/security/cve/CVE-2018-1000122
https://curl.haxx.se/docs/adv_2018-b047.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
https://linux.oracle.com/cve/CVE-2018-1000122.html
https://linux.oracle.com/errata/ELSA-2018-3157.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html
https://ubuntu.com/security/notices/USN-3598-1
https://ubuntu.com/security/notices/USN-3598-2
https://usn.ubuntu.com/3598-1/
https://usn.ubuntu.com/3598-2/
https://www.debian.org/security/2018/dsa-4136
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
libcurl3-gnutls CVE-2018-1000301 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.16
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104225
http://www.securitytracker.com/id/1040931
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3157
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2020:0544
https://access.redhat.com/errata/RHSA-2020:0594
https://access.redhat.com/security/cve/CVE-2018-1000301
https://curl.haxx.se/docs/adv_2018-b138.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301
https://linux.oracle.com/cve/CVE-2018-1000301.html
https://linux.oracle.com/errata/ELSA-2018-3157.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html
https://security.gentoo.org/glsa/201806-05
https://ubuntu.com/security/notices/USN-3598-2
https://ubuntu.com/security/notices/USN-3648-1
https://usn.ubuntu.com/3598-2/
https://usn.ubuntu.com/3648-1/
https://www.debian.org/security/2018/dsa-4202
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
libcurl3-gnutls CVE-2018-14618 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.17
Expand...http://www.securitytracker.com/id/1041605
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2019:1880
https://access.redhat.com/security/cve/CVE-2018-14618
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618
https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
https://curl.haxx.se/docs/CVE-2018-14618.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618
https://github.com/curl/curl/issues/2756
https://linux.oracle.com/cve/CVE-2018-14618.html
https://linux.oracle.com/errata/ELSA-2019-1880.html
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014
https://security.gentoo.org/glsa/201903-03
https://ubuntu.com/security/notices/USN-3765-1
https://ubuntu.com/security/notices/USN-3765-2
https://usn.ubuntu.com/3765-1/
https://usn.ubuntu.com/3765-2/
https://www.debian.org/security/2018/dsa-4286
libcurl3-gnutls CVE-2018-16839 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.19
Expand...http://www.securitytracker.com/id/1042012
https://access.redhat.com/security/cve/CVE-2018-16839
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839
https://curl.haxx.se/docs/CVE-2018-16839.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839
https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
https://security.gentoo.org/glsa/201903-03
https://ubuntu.com/security/notices/USN-3805-1
https://usn.ubuntu.com/3805-1/
https://www.debian.org/security/2018/dsa-4331
libcurl3-gnutls CVE-2018-16842 MEDIUM 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.19
Expand...http://www.securitytracker.com/id/1042014
https://access.redhat.com/errata/RHSA-2019:2181
https://access.redhat.com/security/cve/CVE-2018-16842
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842
https://curl.haxx.se/docs/CVE-2018-16842.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842
https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211
https://linux.oracle.com/cve/CVE-2018-16842.html
https://linux.oracle.com/errata/ELSA-2019-2181.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
https://security.gentoo.org/glsa/201903-03
https://ubuntu.com/security/notices/USN-3805-1
https://ubuntu.com/security/notices/USN-3805-2
https://usn.ubuntu.com/3805-1/
https://usn.ubuntu.com/3805-2/
https://www.debian.org/security/2018/dsa-4331
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
libcurl3-gnutls CVE-2016-7141 LOW 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.10
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html
http://rhn.redhat.com/errata/RHSA-2016-2575.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://seclists.org/oss-sec/2016/q3/419
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/92754
http://www.securitytracker.com/id/1036739
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-7141
https://bugzilla.redhat.com/show_bug.cgi?id=1373229
https://curl.haxx.se/docs/adv_20160907.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141
https://github.com/curl/curl/commit/curl-7_50_2~32
https://linux.oracle.com/cve/CVE-2016-7141.html
https://linux.oracle.com/errata/ELSA-2016-2575.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
libcurl3-gnutls CVE-2016-7167 LOW 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.10
Expand...http://openwall.com/lists/oss-security/2016/09/14/1
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/92975
http://www.securitytracker.com/id/1036813
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.538632
https://access.redhat.com/errata/RHSA-2017:2016
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-7167
https://curl.haxx.se/docs/adv_20160914.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167
https://linux.oracle.com/cve/CVE-2016-7167.html
https://linux.oracle.com/errata/ELSA-2017-2016.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B3IU2FRXQNU6UJIQT4NGLWWTP2GJQXO7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTH54DFOS4TSYPG5XKJDGAG4XPAR4T7M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZMRWVISG7VUCYRMF23A2UHMYD72VQWAK/
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
libcurl3-gnutls CVE-2016-8616 LOW 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.10
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94094
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8616
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616
https://curl.haxx.se/CVE-2016-8616.patch
https://curl.haxx.se/docs/adv_20161102B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
https://linux.oracle.com/cve/CVE-2016-8616.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl3-gnutls CVE-2016-8621 LOW 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.10
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94101
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8621
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621
https://curl.haxx.se/CVE-2016-8621.patch
https://curl.haxx.se/docs/adv_20161102G.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
https://linux.oracle.com/cve/CVE-2016-8621.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl3-gnutls CVE-2016-9586 LOW 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.11
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/95019
http://www.securitytracker.com/id/1037515
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-9586
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
https://curl.haxx.se/docs/adv_20161221A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
libcurl3-gnutls CVE-2017-1000100 LOW 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.11
Expand...http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/100286
http://www.securitytracker.com/id/1039118
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000100
https://curl.haxx.se/docs/adv_20170809B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
https://security.gentoo.org/glsa/201709-14
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
libcurl3-gnutls CVE-2017-1000101 LOW 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.11
Expand...http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/100249
http://www.securitytracker.com/id/1039117
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000101
https://curl.haxx.se/docs/adv_20170809A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
https://security.gentoo.org/glsa/201709-14
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3441-1
libcurl3-gnutls CVE-2017-7407 LOW 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.11
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-7407
https://curl.haxx.se/docs/adv_20170403.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
https://security.gentoo.org/glsa/201709-14
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
libcurl3-gnutls CVE-2019-3823 LOW 7.35.0-1ubuntu2.6 7.35.0-1ubuntu2.20
Expand...http://www.securityfocus.com/bid/106950
https://access.redhat.com/errata/RHSA-2019:3701
https://access.redhat.com/security/cve/CVE-2019-3823
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823
https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf
https://curl.haxx.se/docs/CVE-2019-3823.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
https://linux.oracle.com/cve/CVE-2019-3823.html
https://linux.oracle.com/errata/ELSA-2019-3701.html
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E
https://security.gentoo.org/glsa/201903-03
https://security.netapp.com/advisory/ntap-20190315-0001/
https://ubuntu.com/security/notices/USN-3882-1
https://usn.ubuntu.com/3882-1/
https://www.debian.org/security/2019/dsa-4386
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
libdb5.3 CVE-2017-10140 MEDIUM 5.3.28-3ubuntu3 5.3.28-3ubuntu3.1
Expand...http://seclists.org/oss-sec/2017/q3/285
http://www.openwall.com/lists/oss-security/2017/08/12/1
http://www.postfix.org/announcements/postfix-3.2.2.html
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/security/cve/CVE-2017-10140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10140
https://ubuntu.com/security/notices/USN-3489-1
https://ubuntu.com/security/notices/USN-3489-2
https://www.oracle.com/security-alerts/cpujul2020.html
libdbd-mysql-perl CVE-2014-9906 MEDIUM 4.025-1 4.025-1ubuntu0.1
Expand...http://cpansearch.perl.org/src/CAPTTOFU/DBD-mysql-4.029/ChangeLog
http://www.debian.org/security/2016/dsa-3635
http://www.openwall.com/lists/oss-security/2016/07/27/5
http://www.openwall.com/lists/oss-security/2016/07/27/6
http://www.securityfocus.com/bid/92149
https://access.redhat.com/security/cve/CVE-2014-9906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9906
https://github.com/perl5-dbi/DBD-mysql/commit/a56ae87a4c1c1fead7d09c3653905841ccccf1cc
https://github.com/perl5-dbi/DBD-mysql/pull/27
https://rt.cpan.org/Public/Bug/Display.html?id=97625
https://ubuntu.com/security/notices/USN-3103-1
libdbd-mysql-perl CVE-2015-8949 MEDIUM 4.025-1 4.025-1ubuntu0.1
Expand...http://seclists.org/oss-sec/2016/q3/150
http://www.debian.org/security/2016/dsa-3635
http://www.openwall.com/lists/oss-security/2016/07/25/13
http://www.openwall.com/lists/oss-security/2016/07/27/1
http://www.securityfocus.com/bid/92118
https://access.redhat.com/security/cve/CVE-2015-8949
https://blog.fuzzing-project.org/50-Use-after-free-in-my_login-function-of-DBDmysql-Perl-module.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8949
https://github.com/perl5-dbi/DBD-mysql/blob/4.033_01/Changes
https://github.com/perl5-dbi/DBD-mysql/commit/cf0aa7751f6ef8445e9310a64b14dc81460ca156
https://github.com/perl5-dbi/DBD-mysql/pull/45
https://security.gentoo.org/glsa/201701-51
https://ubuntu.com/security/notices/USN-3103-1
libdbd-mysql-perl CVE-2016-1246 MEDIUM 4.025-1 4.025-1ubuntu0.1
Expand...http://blogs.perl.org/users/mike_b/2016/10/security-release---buffer-overflow-in-dbdmysql-perl-library.html
http://www.debian.org/security/2016/dsa-3684
http://www.securityfocus.com/bid/93337
https://access.redhat.com/security/cve/CVE-2016-1246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1246
https://github.com/perl5-dbi/DBD-mysql/commit/7c164a0c86cec6ee95df1d141e67b0e85dfdefd2
https://security.gentoo.org/glsa/201701-51
https://ubuntu.com/security/notices/USN-3103-1
libdbus-1-3 CVE-2015-0245 MEDIUM 1.6.18-0ubuntu4.3 1.6.18-0ubuntu4.4
Expand...http://advisories.mageia.org/MGASA-2015-0071.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html
http://www.debian.org/security/2015/dsa-3161
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2015/02/09/6
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
https://access.redhat.com/security/cve/CVE-2015-0245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245
https://ubuntu.com/security/notices/USN-3116-1
libexpat1 CVE-2012-6702 MEDIUM 2.1.0-4ubuntu1.1 2.1.0-4ubuntu1.3
Expand...http://seclists.org/oss-sec/2016/q2/468
http://www.debian.org/security/2016/dsa-3597
http://www.openwall.com/lists/oss-security/2016/06/03/8
http://www.openwall.com/lists/oss-security/2016/06/04/1
http://www.securityfocus.com/bid/91483
http://www.ubuntu.com/usn/USN-3010-1
https://access.redhat.com/security/cve/CVE-2012-6702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702
https://security.gentoo.org/glsa/201701-21
https://source.android.com/security/bulletin/2016-11-01.html
https://ubuntu.com/security/notices/USN-3010-1
https://ubuntu.com/security/notices/USN-3013-1
https://www.tenable.com/security/tns-2016-20
libexpat1 CVE-2016-0718 MEDIUM 2.1.0-4ubuntu1.1 2.1.0-4ubuntu1.2
Expand...http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html
http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html
http://rhn.redhat.com/errata/RHSA-2016-2824.html
http://seclists.org/fulldisclosure/2017/Feb/68
http://support.eset.com/ca6333/
http://www.debian.org/security/2016/dsa-3582
http://www.mozilla.org/security/announce/2016/mfsa2016-68.html
http://www.openwall.com/lists/oss-security/2016/05/17/12
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/90729
http://www.securitytracker.com/id/1036348
http://www.securitytracker.com/id/1036415
http://www.securitytracker.com/id/1037705
http://www.ubuntu.com/usn/USN-2983-1
http://www.ubuntu.com/usn/USN-3044-1
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2016-0718
https://bugzilla.mozilla.org/show_bug.cgi?id=1236923
https://bugzilla.redhat.com/show_bug.cgi?id=1296102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2016-0718.html
https://linux.oracle.com/errata/ELSA-2016-2824.html
https://security.gentoo.org/glsa/201701-21
https://source.android.com/security/bulletin/2016-11-01.html
https://support.apple.com/HT206903
https://ubuntu.com/security/notices/USN-2983-1
https://ubuntu.com/security/notices/USN-3013-1
https://ubuntu.com/security/notices/USN-3044-1
https://www.tenable.com/security/tns-2016-20
libexpat1 CVE-2016-5300 MEDIUM 2.1.0-4ubuntu1.1 2.1.0-4ubuntu1.3
Expand...http://seclists.org/oss-sec/2016/q2/468
http://www.debian.org/security/2016/dsa-3597
http://www.openwall.com/lists/oss-security/2016/06/04/4
http://www.openwall.com/lists/oss-security/2016/06/04/5
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91159
http://www.ubuntu.com/usn/USN-3010-1
https://access.redhat.com/security/cve/CVE-2016-5300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://source.android.com/security/bulletin/2016-11-01.html
https://ubuntu.com/security/notices/USN-3010-1
https://ubuntu.com/security/notices/USN-3013-1
https://www.tenable.com/security/tns-2016-20
libexpat1 CVE-2017-9233 MEDIUM 2.1.0-4ubuntu1.1 2.1.0-4ubuntu1.4
Expand...http://www.debian.org/security/2017/dsa-3898
http://www.openwall.com/lists/oss-security/2017/06/17/7
http://www.securityfocus.com/bid/99276
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-9233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233
https://github.com/libexpat/libexpat/blob/master/expat/Changes
https://libexpat.github.io/doc/cve-2017-9233/
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://support.apple.com/HT208112
https://support.apple.com/HT208113
https://support.apple.com/HT208115
https://support.apple.com/HT208144
https://support.f5.com/csp/article/K03244804
https://ubuntu.com/security/notices/USN-3356-1
https://ubuntu.com/security/notices/USN-3356-2
libffi6 CVE-2017-1000376 MEDIUM 3.1~rc1+r3.0.13-12ubuntu0.1 3.1~rc1+r3.0.13-12ubuntu0.2
Expand...http://www.debian.org/security/2017/dsa-3889
https://access.redhat.com/security/cve/CVE-2017-1000376
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000376
https://ubuntu.com/security/notices/USN-3454-1
https://ubuntu.com/security/notices/USN-3454-2
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
libgcrypt11 CVE-2016-6313 HIGH 1.5.3-2ubuntu4.2 1.5.3-2ubuntu4.4
Expand...http://rhn.redhat.com/errata/RHSA-2016-2674.html
http://www.debian.org/security/2016/dsa-3649
http://www.debian.org/security/2016/dsa-3650
http://www.securityfocus.com/bid/92527
http://www.securitytracker.com/id/1036635
http://www.ubuntu.com/usn/USN-3064-1
http://www.ubuntu.com/usn/USN-3065-1
https://access.redhat.com/security/cve/CVE-2016-6313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS
https://linux.oracle.com/cve/CVE-2016-6313.html
https://linux.oracle.com/errata/ELSA-2016-2674.html
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
https://security.gentoo.org/glsa/201610-04
https://security.gentoo.org/glsa/201612-01
https://ubuntu.com/security/notices/USN-3064-1
https://ubuntu.com/security/notices/USN-3065-1
libgcrypt11 CVE-2015-7511 MEDIUM 1.5.3-2ubuntu4.2 1.5.3-2ubuntu4.3
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html
http://www.cs.tau.ac.IL/~tromer/ecdh/
http://www.cs.tau.ac.il/~tromer/ecdh/
http://www.debian.org/security/2016/dsa-3474
http://www.debian.org/security/2016/dsa-3478
http://www.securityfocus.com/bid/83253
http://www.ubuntu.com/usn/USN-2896-1
https://access.redhat.com/security/cve/CVE-2015-7511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/
https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html
https://security.gentoo.org/glsa/201610-04
https://ubuntu.com/security/notices/USN-2896-1
libgcrypt11 CVE-2017-7526 MEDIUM 1.5.3-2ubuntu4.2 1.5.3-2ubuntu4.5
Expand...http://www.securityfocus.com/bid/99338
http://www.securitytracker.com/id/1038915
https://access.redhat.com/security/cve/CVE-2017-7526
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526
https://eprint.iacr.org/2017/627
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=78130828e9a140a9de4dafadbc844dbb64cb709a
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=e6a3dc9900433bbc8ad362a595a3837318c28fa9
https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html
https://ubuntu.com/security/notices/USN-3347-1
https://ubuntu.com/security/notices/USN-3347-2
https://ubuntu.com/security/notices/USN-3733-1
https://ubuntu.com/security/notices/USN-3733-2
https://usn.ubuntu.com/3733-1/
https://usn.ubuntu.com/3733-2/
https://www.debian.org/security/2017/dsa-3901
https://www.debian.org/security/2017/dsa-3960
libgcrypt11 CVE-2018-0495 LOW 1.5.3-2ubuntu4.2 1.5.3-2ubuntu4.6
Expand...http://www.securitytracker.com/id/1041144
http://www.securitytracker.com/id/1041147
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1296
https://access.redhat.com/errata/RHSA-2019:1297
https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/errata/RHSA-2019:2237
https://access.redhat.com/security/cve/CVE-2018-0495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495
https://dev.gnupg.org/T4011
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.38_release_notes
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965
https://linux.oracle.com/cve/CVE-2018-0495.html
https://linux.oracle.com/errata/ELSA-2019-2237.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
https://ubuntu.com/security/notices/USN-3689-1
https://ubuntu.com/security/notices/USN-3689-2
https://ubuntu.com/security/notices/USN-3692-1
https://ubuntu.com/security/notices/USN-3692-2
https://ubuntu.com/security/notices/USN-3850-1
https://ubuntu.com/security/notices/USN-3850-2
https://usn.ubuntu.com/3689-1/
https://usn.ubuntu.com/3689-2/
https://usn.ubuntu.com/3692-1/
https://usn.ubuntu.com/3692-2/
https://usn.ubuntu.com/3850-1/
https://usn.ubuntu.com/3850-2/
https://www.debian.org/security/2018/dsa-4231
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
libgnutls-openssl27 CVE-2017-5335 MEDIUM 2.12.23-12ubuntu2.4 2.12.23-12ubuntu2.6
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://seclists.org/oss-sec/2017/q1/51
http://www.openwall.com/lists/oss-security/2017/01/10/7
http://www.openwall.com/lists/oss-security/2017/01/11/4
http://www.securityfocus.com/bid/95374
http://www.securitytracker.com/id/1037576
https://access.redhat.com/errata/RHSA-2017:2292
https://access.redhat.com/security/cve/CVE-2017-5335
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=337
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335
https://gitlab.com/gnutls/gnutls/commit/49be4f7b82eba2363bb8d4090950dad976a77a3a
https://gnutls.org/security.html#GNUTLS-SA-2017-2
https://linux.oracle.com/cve/CVE-2017-5335.html
https://linux.oracle.com/errata/ELSA-2017-2292.html
https://security.gentoo.org/glsa/201702-04
https://ubuntu.com/security/notices/USN-3183-1
libgnutls-openssl27 CVE-2017-5336 MEDIUM 2.12.23-12ubuntu2.4 2.12.23-12ubuntu2.6
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://seclists.org/oss-sec/2017/q1/51
http://www.openwall.com/lists/oss-security/2017/01/10/7
http://www.openwall.com/lists/oss-security/2017/01/11/4
http://www.securityfocus.com/bid/95377
http://www.securitytracker.com/id/1037576
https://access.redhat.com/errata/RHSA-2017:2292
https://access.redhat.com/security/cve/CVE-2017-5336
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336
https://gitlab.com/gnutls/gnutls/commit/5140422e0d7319a8e2fe07f02cbcafc4d6538732
https://gnutls.org/security.html#GNUTLS-SA-2017-2
https://linux.oracle.com/cve/CVE-2017-5336.html
https://linux.oracle.com/errata/ELSA-2017-2292.html
https://security.gentoo.org/glsa/201702-04
https://ubuntu.com/security/notices/USN-3183-1
libgnutls-openssl27 CVE-2017-5337 MEDIUM 2.12.23-12ubuntu2.4 2.12.23-12ubuntu2.6
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://seclists.org/oss-sec/2017/q1/51
http://www.openwall.com/lists/oss-security/2017/01/10/7
http://www.openwall.com/lists/oss-security/2017/01/11/4
http://www.securityfocus.com/bid/95372
http://www.securitytracker.com/id/1037576
https://access.redhat.com/errata/RHSA-2017:2292
https://access.redhat.com/security/cve/CVE-2017-5337
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=338
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337
https://gitlab.com/gnutls/gnutls/commit/94fcf1645ea17223237aaf8d19132e004afddc1a
https://gnutls.org/security.html#GNUTLS-SA-2017-2
https://linux.oracle.com/cve/CVE-2017-5337.html
https://linux.oracle.com/errata/ELSA-2017-2292.html
https://security.gentoo.org/glsa/201702-04
https://ubuntu.com/security/notices/USN-3183-1
libgnutls-openssl27 CVE-2016-8610 LOW 2.12.23-12ubuntu2.4 2.12.23-12ubuntu2.6
Expand...http://rhn.redhat.com/errata/RHSA-2017-0286.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/oss-sec/2016/q4/224
http://security.360.cn/cve/CVE-2016-8610
http://security.360.cn/cve/CVE-2016-8610/
http://www.openwall.com/lists/oss-security/2016/10/24/3
http://www.securityfocus.com/bid/93841
http://www.securitytracker.com/id/1037084
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/security/cve/CVE-2016-8610
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401
https://linux.oracle.com/cve/CVE-2016-8610.html
https://linux.oracle.com/errata/ELSA-2017-0574.html
https://security.360.cn/cve/CVE-2016-8610/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc
https://security.netapp.com/advisory/ntap-20171130-0001/
https://security.paloaltonetworks.com/CVE-2016-8610
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us
https://ubuntu.com/security/notices/USN-3181-1
https://ubuntu.com/security/notices/USN-3183-1
https://ubuntu.com/security/notices/USN-3183-2
https://www.debian.org/security/2017/dsa-3773
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
libgnutls-openssl27 CVE-2017-7869 LOW 2.12.23-12ubuntu2.4 2.12.23-12ubuntu2.8
Expand...http://www.securityfocus.com/bid/97040
https://access.redhat.com/errata/RHSA-2017:2292
https://access.redhat.com/security/cve/CVE-2017-7869
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869
https://gitlab.com/gnutls/gnutls/commit/51464af713d71802e3c6d5ac15f1a95132a354fe
https://gnutls.org/security.html#GNUTLS-SA-2017-3
https://linux.oracle.com/cve/CVE-2017-7869.html
https://linux.oracle.com/errata/ELSA-2017-2292.html
https://ubuntu.com/security/notices/USN-3318-1
https://www.gnutls.org/security.html
https://www.gnutls.org/security.html#GNUTLS-SA-2017-3
libgnutls26 CVE-2017-5335 MEDIUM 2.12.23-12ubuntu2.4 2.12.23-12ubuntu2.6
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://seclists.org/oss-sec/2017/q1/51
http://www.openwall.com/lists/oss-security/2017/01/10/7
http://www.openwall.com/lists/oss-security/2017/01/11/4
http://www.securityfocus.com/bid/95374
http://www.securitytracker.com/id/1037576
https://access.redhat.com/errata/RHSA-2017:2292
https://access.redhat.com/security/cve/CVE-2017-5335
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=337
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335
https://gitlab.com/gnutls/gnutls/commit/49be4f7b82eba2363bb8d4090950dad976a77a3a
https://gnutls.org/security.html#GNUTLS-SA-2017-2
https://linux.oracle.com/cve/CVE-2017-5335.html
https://linux.oracle.com/errata/ELSA-2017-2292.html
https://security.gentoo.org/glsa/201702-04
https://ubuntu.com/security/notices/USN-3183-1
libgnutls26 CVE-2017-5336 MEDIUM 2.12.23-12ubuntu2.4 2.12.23-12ubuntu2.6
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://seclists.org/oss-sec/2017/q1/51
http://www.openwall.com/lists/oss-security/2017/01/10/7
http://www.openwall.com/lists/oss-security/2017/01/11/4
http://www.securityfocus.com/bid/95377
http://www.securitytracker.com/id/1037576
https://access.redhat.com/errata/RHSA-2017:2292
https://access.redhat.com/security/cve/CVE-2017-5336
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336
https://gitlab.com/gnutls/gnutls/commit/5140422e0d7319a8e2fe07f02cbcafc4d6538732
https://gnutls.org/security.html#GNUTLS-SA-2017-2
https://linux.oracle.com/cve/CVE-2017-5336.html
https://linux.oracle.com/errata/ELSA-2017-2292.html
https://security.gentoo.org/glsa/201702-04
https://ubuntu.com/security/notices/USN-3183-1
libgnutls26 CVE-2017-5337 MEDIUM 2.12.23-12ubuntu2.4 2.12.23-12ubuntu2.6
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://seclists.org/oss-sec/2017/q1/51
http://www.openwall.com/lists/oss-security/2017/01/10/7
http://www.openwall.com/lists/oss-security/2017/01/11/4
http://www.securityfocus.com/bid/95372
http://www.securitytracker.com/id/1037576
https://access.redhat.com/errata/RHSA-2017:2292
https://access.redhat.com/security/cve/CVE-2017-5337
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=338
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337
https://gitlab.com/gnutls/gnutls/commit/94fcf1645ea17223237aaf8d19132e004afddc1a
https://gnutls.org/security.html#GNUTLS-SA-2017-2
https://linux.oracle.com/cve/CVE-2017-5337.html
https://linux.oracle.com/errata/ELSA-2017-2292.html
https://security.gentoo.org/glsa/201702-04
https://ubuntu.com/security/notices/USN-3183-1
libgnutls26 CVE-2016-8610 LOW 2.12.23-12ubuntu2.4 2.12.23-12ubuntu2.6
Expand...http://rhn.redhat.com/errata/RHSA-2017-0286.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/oss-sec/2016/q4/224
http://security.360.cn/cve/CVE-2016-8610
http://security.360.cn/cve/CVE-2016-8610/
http://www.openwall.com/lists/oss-security/2016/10/24/3
http://www.securityfocus.com/bid/93841
http://www.securitytracker.com/id/1037084
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/security/cve/CVE-2016-8610
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401
https://linux.oracle.com/cve/CVE-2016-8610.html
https://linux.oracle.com/errata/ELSA-2017-0574.html
https://security.360.cn/cve/CVE-2016-8610/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc
https://security.netapp.com/advisory/ntap-20171130-0001/
https://security.paloaltonetworks.com/CVE-2016-8610
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us
https://ubuntu.com/security/notices/USN-3181-1
https://ubuntu.com/security/notices/USN-3183-1
https://ubuntu.com/security/notices/USN-3183-2
https://www.debian.org/security/2017/dsa-3773
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
libgnutls26 CVE-2017-7869 LOW 2.12.23-12ubuntu2.4 2.12.23-12ubuntu2.8
Expand...http://www.securityfocus.com/bid/97040
https://access.redhat.com/errata/RHSA-2017:2292
https://access.redhat.com/security/cve/CVE-2017-7869
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869
https://gitlab.com/gnutls/gnutls/commit/51464af713d71802e3c6d5ac15f1a95132a354fe
https://gnutls.org/security.html#GNUTLS-SA-2017-3
https://linux.oracle.com/cve/CVE-2017-7869.html
https://linux.oracle.com/errata/ELSA-2017-2292.html
https://ubuntu.com/security/notices/USN-3318-1
https://www.gnutls.org/security.html
https://www.gnutls.org/security.html#GNUTLS-SA-2017-3
libgssapi-krb5-2 CVE-2015-8629 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0493.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/82801
http://www.securitytracker.com/id/1034914
https://access.redhat.com/security/cve/CVE-2015-8629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb
https://linux.oracle.com/cve/CVE-2015-8629.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
libgssapi-krb5-2 CVE-2015-8630 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securitytracker.com/id/1034915
https://access.redhat.com/security/cve/CVE-2015-8630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630
https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b
https://linux.oracle.com/cve/CVE-2015-8630.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
libgssapi-krb5-2 CVE-2015-8631 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0493.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securitytracker.com/id/1034916
https://access.redhat.com/security/cve/CVE-2015-8631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
https://linux.oracle.com/cve/CVE-2015-8631.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
libgssapi-krb5-2 CVE-2016-3119 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html
http://rhn.redhat.com/errata/RHSA-2016-2591.html
http://www.securityfocus.com/bid/85392
http://www.securitytracker.com/id/1035399
https://access.redhat.com/security/cve/CVE-2016-3119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119
https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99
https://linux.oracle.com/cve/CVE-2016-3119.html
https://linux.oracle.com/errata/ELSA-2016-2591.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
libgssapi-krb5-2 CVE-2016-3120 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html
http://rhn.redhat.com/errata/RHSA-2016-2591.html
http://web.mit.edu/kerberos/krb5-1.13/
http://web.mit.edu/kerberos/krb5-1.14/
http://www.securityfocus.com/bid/92132
http://www.securitytracker.com/id/1036442
https://access.redhat.com/security/cve/CVE-2016-3120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120
https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
https://linux.oracle.com/cve/CVE-2016-3120.html
https://linux.oracle.com/errata/ELSA-2016-2591.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
libgssapi-krb5-2 CVE-2017-11368 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securityfocus.com/bid/100291
https://access.redhat.com/errata/RHSA-2018:0666
https://access.redhat.com/security/cve/CVE-2017-11368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368
https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970
https://github.com/krb5/krb5/pull/678/files
https://linux.oracle.com/cve/CVE-2017-11368.html
https://linux.oracle.com/errata/ELSA-2018-0666.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HNWXM6OQU7G23MG7XWIOBRGP43ECLDT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBUTXMNZWMVJLQ4NDX5OQFPUVCJRLV3W/
libgssapi-krb5-2 CVE-2017-11462 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libgssapi-krb5-2 CVE-2018-5729 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libgssapi-krb5-2 CVE-2018-5730 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libgssapi3-heimdal CVE-2017-11103 MEDIUM 1.6~git20131207+dfsg-1ubuntu1.1 1.6~git20131207+dfsg-1ubuntu1.2
Expand...http://www.debian.org/security/2017/dsa-3912
http://www.h5l.org/advisories.html?show=2017-07-11
http://www.securityfocus.com/bid/99551
http://www.securitytracker.com/id/1038876
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-11103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
https://orpheus-lyre.info/
https://support.apple.com/HT208112
https://support.apple.com/HT208144
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3353-1
https://ubuntu.com/security/notices/USN-3353-2
https://ubuntu.com/security/notices/USN-3353-3
https://ubuntu.com/security/notices/USN-3353-4
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc
https://www.orpheus-lyre.info/
https://www.samba.org/samba/security/CVE-2017-11103.html
libhcrypto4-heimdal CVE-2017-11103 MEDIUM 1.6~git20131207+dfsg-1ubuntu1.1 1.6~git20131207+dfsg-1ubuntu1.2
Expand...http://www.debian.org/security/2017/dsa-3912
http://www.h5l.org/advisories.html?show=2017-07-11
http://www.securityfocus.com/bid/99551
http://www.securitytracker.com/id/1038876
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-11103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
https://orpheus-lyre.info/
https://support.apple.com/HT208112
https://support.apple.com/HT208144
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3353-1
https://ubuntu.com/security/notices/USN-3353-2
https://ubuntu.com/security/notices/USN-3353-3
https://ubuntu.com/security/notices/USN-3353-4
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc
https://www.orpheus-lyre.info/
https://www.samba.org/samba/security/CVE-2017-11103.html
libheimbase1-heimdal CVE-2017-11103 MEDIUM 1.6~git20131207+dfsg-1ubuntu1.1 1.6~git20131207+dfsg-1ubuntu1.2
Expand...http://www.debian.org/security/2017/dsa-3912
http://www.h5l.org/advisories.html?show=2017-07-11
http://www.securityfocus.com/bid/99551
http://www.securitytracker.com/id/1038876
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-11103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
https://orpheus-lyre.info/
https://support.apple.com/HT208112
https://support.apple.com/HT208144
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3353-1
https://ubuntu.com/security/notices/USN-3353-2
https://ubuntu.com/security/notices/USN-3353-3
https://ubuntu.com/security/notices/USN-3353-4
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc
https://www.orpheus-lyre.info/
https://www.samba.org/samba/security/CVE-2017-11103.html
libheimntlm0-heimdal CVE-2017-11103 MEDIUM 1.6~git20131207+dfsg-1ubuntu1.1 1.6~git20131207+dfsg-1ubuntu1.2
Expand...http://www.debian.org/security/2017/dsa-3912
http://www.h5l.org/advisories.html?show=2017-07-11
http://www.securityfocus.com/bid/99551
http://www.securitytracker.com/id/1038876
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-11103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
https://orpheus-lyre.info/
https://support.apple.com/HT208112
https://support.apple.com/HT208144
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3353-1
https://ubuntu.com/security/notices/USN-3353-2
https://ubuntu.com/security/notices/USN-3353-3
https://ubuntu.com/security/notices/USN-3353-4
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc
https://www.orpheus-lyre.info/
https://www.samba.org/samba/security/CVE-2017-11103.html
libhx509-5-heimdal CVE-2017-11103 MEDIUM 1.6~git20131207+dfsg-1ubuntu1.1 1.6~git20131207+dfsg-1ubuntu1.2
Expand...http://www.debian.org/security/2017/dsa-3912
http://www.h5l.org/advisories.html?show=2017-07-11
http://www.securityfocus.com/bid/99551
http://www.securitytracker.com/id/1038876
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-11103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
https://orpheus-lyre.info/
https://support.apple.com/HT208112
https://support.apple.com/HT208144
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3353-1
https://ubuntu.com/security/notices/USN-3353-2
https://ubuntu.com/security/notices/USN-3353-3
https://ubuntu.com/security/notices/USN-3353-4
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc
https://www.orpheus-lyre.info/
https://www.samba.org/samba/security/CVE-2017-11103.html
libidn11 CVE-2016-6261 MEDIUM 1.28-1ubuntu2 1.28-1ubuntu2.1
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00016.html
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://ubuntu.com/security/notices/USN-3068-1
libidn11 CVE-2016-6262 MEDIUM 1.28-1ubuntu2 1.28-1ubuntu2.1
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://ubuntu.com/security/notices/USN-3068-1
libidn11 CVE-2016-6263 MEDIUM 1.28-1ubuntu2 1.28-1ubuntu2.1
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://security.gentoo.org/glsa/201908-06
https://ubuntu.com/security/notices/USN-3068-1
libidn11 CVE-2017-14062 MEDIUM 1.28-1ubuntu2 1.28-1ubuntu2.2
Expand...http://www.debian.org/security/2017/dsa-3988
https://access.redhat.com/security/cve/CVE-2017-14062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14062
https://gitlab.com/libidn/libidn2/blob/master/NEWS
https://gitlab.com/libidn/libidn2/commit/3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd
https://lists.debian.org/debian-lts-announce/2018/07/msg00040.html
https://ubuntu.com/security/notices/USN-3421-1
https://ubuntu.com/security/notices/USN-3434-1
https://ubuntu.com/security/notices/USN-3434-2
libidn11 CVE-2015-2059 LOW 1.28-1ubuntu2 1.28-1ubuntu2.1
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html
http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3578
http://www.openwall.com/lists/oss-security/2015/02/23/25
http://www.securityfocus.com/bid/72736
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2015-2059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2059
https://github.com/jabberd2/jabberd2/issues/85
https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00026.html (regression)
https://ubuntu.com/security/notices/USN-3068-1
libidn11 CVE-2015-8948 LOW 1.28-1ubuntu2 1.28-1ubuntu2.1
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2015-8948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://marc.info/?l=oss-security&m=146910769415616&w=2
https://ubuntu.com/security/notices/USN-3068-1
libk5crypto3 CVE-2015-8629 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0493.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/82801
http://www.securitytracker.com/id/1034914
https://access.redhat.com/security/cve/CVE-2015-8629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb
https://linux.oracle.com/cve/CVE-2015-8629.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
libk5crypto3 CVE-2015-8630 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securitytracker.com/id/1034915
https://access.redhat.com/security/cve/CVE-2015-8630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630
https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b
https://linux.oracle.com/cve/CVE-2015-8630.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
libk5crypto3 CVE-2015-8631 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0493.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securitytracker.com/id/1034916
https://access.redhat.com/security/cve/CVE-2015-8631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
https://linux.oracle.com/cve/CVE-2015-8631.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
libk5crypto3 CVE-2016-3119 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html
http://rhn.redhat.com/errata/RHSA-2016-2591.html
http://www.securityfocus.com/bid/85392
http://www.securitytracker.com/id/1035399
https://access.redhat.com/security/cve/CVE-2016-3119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119
https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99
https://linux.oracle.com/cve/CVE-2016-3119.html
https://linux.oracle.com/errata/ELSA-2016-2591.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
libk5crypto3 CVE-2016-3120 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html
http://rhn.redhat.com/errata/RHSA-2016-2591.html
http://web.mit.edu/kerberos/krb5-1.13/
http://web.mit.edu/kerberos/krb5-1.14/
http://www.securityfocus.com/bid/92132
http://www.securitytracker.com/id/1036442
https://access.redhat.com/security/cve/CVE-2016-3120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120
https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
https://linux.oracle.com/cve/CVE-2016-3120.html
https://linux.oracle.com/errata/ELSA-2016-2591.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
libk5crypto3 CVE-2017-11368 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securityfocus.com/bid/100291
https://access.redhat.com/errata/RHSA-2018:0666
https://access.redhat.com/security/cve/CVE-2017-11368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368
https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970
https://github.com/krb5/krb5/pull/678/files
https://linux.oracle.com/cve/CVE-2017-11368.html
https://linux.oracle.com/errata/ELSA-2018-0666.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HNWXM6OQU7G23MG7XWIOBRGP43ECLDT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBUTXMNZWMVJLQ4NDX5OQFPUVCJRLV3W/
libk5crypto3 CVE-2017-11462 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libk5crypto3 CVE-2018-5729 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libk5crypto3 CVE-2018-5730 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkrb5-26-heimdal CVE-2017-11103 MEDIUM 1.6~git20131207+dfsg-1ubuntu1.1 1.6~git20131207+dfsg-1ubuntu1.2
Expand...http://www.debian.org/security/2017/dsa-3912
http://www.h5l.org/advisories.html?show=2017-07-11
http://www.securityfocus.com/bid/99551
http://www.securitytracker.com/id/1038876
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-11103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
https://orpheus-lyre.info/
https://support.apple.com/HT208112
https://support.apple.com/HT208144
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3353-1
https://ubuntu.com/security/notices/USN-3353-2
https://ubuntu.com/security/notices/USN-3353-3
https://ubuntu.com/security/notices/USN-3353-4
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc
https://www.orpheus-lyre.info/
https://www.samba.org/samba/security/CVE-2017-11103.html
libkrb5-3 CVE-2015-8629 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0493.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/82801
http://www.securitytracker.com/id/1034914
https://access.redhat.com/security/cve/CVE-2015-8629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb
https://linux.oracle.com/cve/CVE-2015-8629.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
libkrb5-3 CVE-2015-8630 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securitytracker.com/id/1034915
https://access.redhat.com/security/cve/CVE-2015-8630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630
https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b
https://linux.oracle.com/cve/CVE-2015-8630.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
libkrb5-3 CVE-2015-8631 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0493.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securitytracker.com/id/1034916
https://access.redhat.com/security/cve/CVE-2015-8631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
https://linux.oracle.com/cve/CVE-2015-8631.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
libkrb5-3 CVE-2016-3119 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html
http://rhn.redhat.com/errata/RHSA-2016-2591.html
http://www.securityfocus.com/bid/85392
http://www.securitytracker.com/id/1035399
https://access.redhat.com/security/cve/CVE-2016-3119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119
https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99
https://linux.oracle.com/cve/CVE-2016-3119.html
https://linux.oracle.com/errata/ELSA-2016-2591.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
libkrb5-3 CVE-2016-3120 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html
http://rhn.redhat.com/errata/RHSA-2016-2591.html
http://web.mit.edu/kerberos/krb5-1.13/
http://web.mit.edu/kerberos/krb5-1.14/
http://www.securityfocus.com/bid/92132
http://www.securitytracker.com/id/1036442
https://access.redhat.com/security/cve/CVE-2016-3120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120
https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
https://linux.oracle.com/cve/CVE-2016-3120.html
https://linux.oracle.com/errata/ELSA-2016-2591.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
libkrb5-3 CVE-2017-11368 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securityfocus.com/bid/100291
https://access.redhat.com/errata/RHSA-2018:0666
https://access.redhat.com/security/cve/CVE-2017-11368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368
https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970
https://github.com/krb5/krb5/pull/678/files
https://linux.oracle.com/cve/CVE-2017-11368.html
https://linux.oracle.com/errata/ELSA-2018-0666.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HNWXM6OQU7G23MG7XWIOBRGP43ECLDT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBUTXMNZWMVJLQ4NDX5OQFPUVCJRLV3W/
libkrb5-3 CVE-2017-11462 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libkrb5-3 CVE-2018-5729 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkrb5-3 CVE-2018-5730 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkrb5support0 CVE-2015-8629 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0493.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/82801
http://www.securitytracker.com/id/1034914
https://access.redhat.com/security/cve/CVE-2015-8629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb
https://linux.oracle.com/cve/CVE-2015-8629.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
libkrb5support0 CVE-2015-8630 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securitytracker.com/id/1034915
https://access.redhat.com/security/cve/CVE-2015-8630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630
https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b
https://linux.oracle.com/cve/CVE-2015-8630.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
libkrb5support0 CVE-2015-8631 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
http://rhn.redhat.com/errata/RHSA-2016-0493.html
http://rhn.redhat.com/errata/RHSA-2016-0532.html
http://www.debian.org/security/2016/dsa-3466
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securitytracker.com/id/1034916
https://access.redhat.com/security/cve/CVE-2015-8631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
https://linux.oracle.com/cve/CVE-2015-8631.html
https://linux.oracle.com/errata/ELSA-2016-0532.html
libkrb5support0 CVE-2016-3119 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html
http://rhn.redhat.com/errata/RHSA-2016-2591.html
http://www.securityfocus.com/bid/85392
http://www.securitytracker.com/id/1035399
https://access.redhat.com/security/cve/CVE-2016-3119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119
https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99
https://linux.oracle.com/cve/CVE-2016-3119.html
https://linux.oracle.com/errata/ELSA-2016-2591.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
libkrb5support0 CVE-2016-3120 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html
http://rhn.redhat.com/errata/RHSA-2016-2591.html
http://web.mit.edu/kerberos/krb5-1.13/
http://web.mit.edu/kerberos/krb5-1.14/
http://www.securityfocus.com/bid/92132
http://www.securitytracker.com/id/1036442
https://access.redhat.com/security/cve/CVE-2016-3120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120
https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
https://linux.oracle.com/cve/CVE-2016-3120.html
https://linux.oracle.com/errata/ELSA-2016-2591.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
libkrb5support0 CVE-2017-11368 MEDIUM 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securityfocus.com/bid/100291
https://access.redhat.com/errata/RHSA-2018:0666
https://access.redhat.com/security/cve/CVE-2017-11368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368
https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970
https://github.com/krb5/krb5/pull/678/files
https://linux.oracle.com/cve/CVE-2017-11368.html
https://linux.oracle.com/errata/ELSA-2018-0666.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HNWXM6OQU7G23MG7XWIOBRGP43ECLDT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBUTXMNZWMVJLQ4NDX5OQFPUVCJRLV3W/
libkrb5support0 CVE-2017-11462 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libkrb5support0 CVE-2018-5729 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5729
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5729.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libkrb5support0 CVE-2018-5730 LOW 1.12+dfsg-2ubuntu5.2 1.12+dfsg-2ubuntu5.4
Expand...http://www.securitytracker.com/id/1042071
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3071
https://access.redhat.com/security/cve/CVE-2018-5730
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
https://bugzilla.redhat.com/show_bug.cgi?id=1551082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://linux.oracle.com/cve/CVE-2018-5730.html
https://linux.oracle.com/errata/ELSA-2018-3071.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
libldap-2.4-2 CVE-2017-9287 MEDIUM 2.4.31-1+nmu2ubuntu8.2 2.4.31-1+nmu2ubuntu8.4
Expand...http://www.debian.org/security/2017/dsa-3868
http://www.openldap.org/its/?findid=8655
http://www.securityfocus.com/bid/98736
http://www.securitytracker.com/id/1038591
https://access.redhat.com/errata/RHSA-2017:1852
https://access.redhat.com/security/cve/CVE-2017-9287
https://bugs.debian.org/863563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9287
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2017-9287.html
https://linux.oracle.com/errata/ELSA-2017-1852.html
https://ubuntu.com/security/notices/USN-3307-1
https://ubuntu.com/security/notices/USN-3307-2
https://www.oracle.com/security-alerts/cpuapr2022.html
libmagic1 CVE-2014-9620 LOW 1:5.14-2ubuntu3.3 1:5.14-2ubuntu3.4
Expand...http://advisories.mageia.org/MGASA-2015-0040.html
http://mx.gw.com/pipermail/file/2014/001653.html
http://mx.gw.com/pipermail/file/2015/001660.html
http://rhn.redhat.com/errata/RHSA-2016-0760.html
http://www.debian.org/security/2015/dsa-3121
http://www.openwall.com/lists/oss-security/2015/01/17/9
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/71715
https://access.redhat.com/security/cve/CVE-2014-9620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620
https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4
https://linux.oracle.com/cve/CVE-2014-9620.html
https://linux.oracle.com/errata/ELSA-2016-0760.html
https://security.gentoo.org/glsa/201503-08
https://ubuntu.com/security/notices/USN-3686-1
https://usn.ubuntu.com/3686-1/
libmagic1 CVE-2014-9621 LOW 1:5.14-2ubuntu3.3 1:5.14-2ubuntu3.4
Expand...http://advisories.mageia.org/MGASA-2015-0040.html
http://mx.gw.com/pipermail/file/2014/001654.html
http://mx.gw.com/pipermail/file/2015/001660.html
http://www.openwall.com/lists/oss-security/2015/01/17/9
https://access.redhat.com/security/cve/CVE-2014-9621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9621
https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c
https://security.gentoo.org/glsa/201503-08
https://ubuntu.com/security/notices/USN-3686-1
https://usn.ubuntu.com/3686-1/
libmagic1 CVE-2014-9653 LOW 1:5.14-2ubuntu3.3 1:5.14-2ubuntu3.4
Expand...http://bugs.gw.com/view.php?id=409
http://marc.info/?l=bugtraq&m=143748090628601&w=2
http://marc.info/?l=bugtraq&m=144050155601375&w=2
http://mx.gw.com/pipermail/file/2014/001649.html
http://openwall.com/lists/oss-security/2015/02/05/13
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-0760.html
http://www.debian.org/security/2015/dsa-3196
http://www.openwall.com/lists/oss-security/2015/02/04/13
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securityfocus.com/bid/72516
https://access.redhat.com/security/cve/CVE-2014-9653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9653
https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f
https://linux.oracle.com/cve/CVE-2014-9653.html
https://linux.oracle.com/errata/ELSA-2016-0760.html
https://security.gentoo.org/glsa/201701-42
https://ubuntu.com/security/notices/USN-3686-1
https://usn.ubuntu.com/3686-1/
libmagic1 CVE-2015-8865 LOW 1:5.14-2ubuntu3.3 1:5.14-2ubuntu3.4
Expand...http://bugs.gw.com/view.php?id=522
http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85802
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8865
https://bugs.php.net/bug.php?id=71527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
libmagic1 CVE-2018-10360 LOW 1:5.14-2ubuntu3.3 1:5.14-2ubuntu3.4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00053.html
https://access.redhat.com/security/cve/CVE-2018-10360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10360
https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22
https://linux.oracle.com/cve/CVE-2018-10360.html
https://linux.oracle.com/errata/ELSA-2020-1022.html
https://security.gentoo.org/glsa/201806-08
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
libmysqlclient18 CVE-2016-0640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86427
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
https://linux.oracle.com/cve/CVE-2016-0640.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
libmysqlclient18 CVE-2016-0641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86470
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
https://linux.oracle.com/cve/CVE-2016-0641.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
libmysqlclient18 CVE-2016-0642 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3557
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86445
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
libmysqlclient18 CVE-2016-0643 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86486
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
https://linux.oracle.com/cve/CVE-2016-0643.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
libmysqlclient18 CVE-2016-0644 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86442
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
https://linux.oracle.com/cve/CVE-2016-0644.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
libmysqlclient18 CVE-2016-0646 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86436
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
https://linux.oracle.com/cve/CVE-2016-0646.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
libmysqlclient18 CVE-2016-0647 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86495
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
https://linux.oracle.com/cve/CVE-2016-0647.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
libmysqlclient18 CVE-2016-0648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86457
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
https://linux.oracle.com/cve/CVE-2016-0648.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
libmysqlclient18 CVE-2016-0649 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86498
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
https://linux.oracle.com/cve/CVE-2016-0649.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
libmysqlclient18 CVE-2016-0650 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86496
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
https://linux.oracle.com/cve/CVE-2016-0650.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
libmysqlclient18 CVE-2016-0666 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86509
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
https://linux.oracle.com/cve/CVE-2016-0666.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
libmysqlclient18 CVE-2016-2047 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://marc.info/?l=oss-security&m=145379584107459&w=2
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3453
http://www.debian.org/security/2016/dsa-3557
http://www.openwall.com/lists/oss-security/2016/01/26/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/81810
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-2047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41
https://linux.oracle.com/cve/CVE-2016-2047.html
https://linux.oracle.com/errata/ELSA-2016-0534.html
https://mariadb.atlassian.net/browse/MDEV-9212
https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
https://mariadb.com/kb/en/mdb-10023-rn/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
libmysqlclient18 CVE-2016-3477 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91902
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
https://linux.oracle.com/cve/CVE-2016-3477.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
libmysqlclient18 CVE-2016-3492 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93650
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-3492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
https://linux.oracle.com/cve/CVE-2016-3492.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
libmysqlclient18 CVE-2016-3521 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91932
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
https://linux.oracle.com/cve/CVE-2016-3521.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
libmysqlclient18 CVE-2016-3615 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91960
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
https://linux.oracle.com/cve/CVE-2016-3615.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
libmysqlclient18 CVE-2016-5440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91953
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-5440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
https://linux.oracle.com/cve/CVE-2016-5440.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
libmysqlclient18 CVE-2016-5584 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93735
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3109-1
libmysqlclient18 CVE-2016-5612 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93630
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612
https://linux.oracle.com/cve/CVE-2016-5612.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://security.gentoo.org/glsa/201701-01
libmysqlclient18 CVE-2016-5624 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93635
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
https://linux.oracle.com/cve/CVE-2016-5624.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
libmysqlclient18 CVE-2016-5626 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93638
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
https://linux.oracle.com/cve/CVE-2016-5626.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
libmysqlclient18 CVE-2016-5629 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93668
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
https://linux.oracle.com/cve/CVE-2016-5629.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
libmysqlclient18 CVE-2016-6662 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
http://rhn.redhat.com/errata/RHSA-2016-2058.html
http://rhn.redhat.com/errata/RHSA-2016-2059.html
http://rhn.redhat.com/errata/RHSA-2016-2060.html
http://rhn.redhat.com/errata/RHSA-2016-2061.html
http://rhn.redhat.com/errata/RHSA-2016-2062.html
http://rhn.redhat.com/errata/RHSA-2016-2077.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Sep/23
http://www.debian.org/security/2016/dsa-3666
http://www.openwall.com/lists/oss-security/2016/09/12/3
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92912
http://www.securitytracker.com/id/1036769
https://access.redhat.com/security/cve/CVE-2016-6662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
https://jira.mariadb.org/browse/MDEV-10465
https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt
https://linux.oracle.com/cve/CVE-2016-6662.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3078-1
https://www.exploit-db.com/exploits/40360/
https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
libmysqlclient18 CVE-2016-6663 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.openwall.com/lists/oss-security/2016/10/25/4
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92911
http://www.securityfocus.com/bid/93614
https://access.redhat.com/security/cve/CVE-2016-6663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html
https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805
https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6663.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://www.exploit-db.com/exploits/40678/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
libmysqlclient18 CVE-2016-6664 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.securityfocus.com/archive/1/539695/100/0/threaded
http://www.securityfocus.com/bid/93612
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2016-6664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6664.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6664
https://security.gentoo.org/glsa/201702-18
https://www.exploit-db.com/exploits/40679/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
libmysqlclient18 CVE-2016-7440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93659
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-7440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://ubuntu.com/security/notices/USN-3109-1
https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
libmysqlclient18 CVE-2016-8283 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93737
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-8283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
https://linux.oracle.com/cve/CVE-2016-8283.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
libmysqlclient18 CVE-2017-10268 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101390
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
https://linux.oracle.com/cve/CVE-2017-10268.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2017-10378 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101375
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
https://linux.oracle.com/cve/CVE-2017-10378.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2017-10379 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101415
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
https://linux.oracle.com/cve/CVE-2017-10379.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
libmysqlclient18 CVE-2017-10384 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101406
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
https://linux.oracle.com/cve/CVE-2017-10384.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
libmysqlclient18 CVE-2017-3238 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95571
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
https://linux.oracle.com/cve/CVE-2017-3238.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
libmysqlclient18 CVE-2017-3243 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95538
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
https://linux.oracle.com/cve/CVE-2017-3243.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
libmysqlclient18 CVE-2017-3244 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95565
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
https://linux.oracle.com/cve/CVE-2017-3244.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
libmysqlclient18 CVE-2017-3258 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95560
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
https://linux.oracle.com/cve/CVE-2017-3258.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
libmysqlclient18 CVE-2017-3265 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95520
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
https://linux.oracle.com/cve/CVE-2017-3265.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
libmysqlclient18 CVE-2017-3291 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95501
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
https://linux.oracle.com/cve/CVE-2017-3291.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
libmysqlclient18 CVE-2017-3305 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://riddle.link/
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/03/17/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97023
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/security/cve/CVE-2017-3305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3308 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97725
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3308.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3309 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97742
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3309.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3312 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95491
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
https://linux.oracle.com/cve/CVE-2017-3312.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
libmysqlclient18 CVE-2017-3313 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3809
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95527
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
https://linux.oracle.com/cve/CVE-2017-3313.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://ubuntu.com/security/notices/USN-3174-1
libmysqlclient18 CVE-2017-3317 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95585
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
https://linux.oracle.com/cve/CVE-2017-3317.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
libmysqlclient18 CVE-2017-3318 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95588
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
https://linux.oracle.com/cve/CVE-2017-3318.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
libmysqlclient18 CVE-2017-3329 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97763
http://www.securitytracker.com/id/1038287
https://access.redhat.com/security/cve/CVE-2017-3329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3453 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97776
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
https://linux.oracle.com/cve/CVE-2017-3453.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3456 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97831
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
https://linux.oracle.com/cve/CVE-2017-3456.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3461 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97812
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3462 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97851
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3463 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97849
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3464 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97818
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
https://linux.oracle.com/cve/CVE-2017-3464.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3600 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97765
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3600
https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/
https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
https://linux.oracle.com/cve/CVE-2017-3600.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3635 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99730
http://www.securitytracker.com/id/1038928
https://access.redhat.com/security/cve/CVE-2017-3635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3636 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99736
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
https://linux.oracle.com/cve/CVE-2017-3636.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
libmysqlclient18 CVE-2017-3641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99767
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
https://linux.oracle.com/cve/CVE-2017-3641.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
libmysqlclient18 CVE-2017-3648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99789
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3651 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99802
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
https://linux.oracle.com/cve/CVE-2017-3651.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3652 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99805
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
libmysqlclient18 CVE-2017-3653 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99810
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
https://linux.oracle.com/cve/CVE-2017-3653.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
libmysqlclient18 CVE-2018-2562 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102713
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
https://linux.oracle.com/cve/CVE-2018-2562.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-2622 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102706
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
https://linux.oracle.com/cve/CVE-2018-2622.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-2640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102678
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
https://linux.oracle.com/cve/CVE-2018-2640.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-2665 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102681
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
https://linux.oracle.com/cve/CVE-2018-2665.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-2668 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102682
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
https://linux.oracle.com/cve/CVE-2018-2668.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-2755 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103807
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
https://linux.oracle.com/cve/CVE-2018-2755.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-2761 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103820
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
https://linux.oracle.com/cve/CVE-2018-2761.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-2767 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/103954
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2018-2767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
https://linux.oracle.com/cve/CVE-2018-2767.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-2771 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103828
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
https://linux.oracle.com/cve/CVE-2018-2771.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-2773 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103811
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
libmysqlclient18 CVE-2018-2781 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103825
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
https://linux.oracle.com/cve/CVE-2018-2781.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-2813 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103830
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
https://linux.oracle.com/cve/CVE-2018-2813.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-2817 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103818
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
https://linux.oracle.com/cve/CVE-2018-2817.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-2818 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103824
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
libmysqlclient18 CVE-2018-2819 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103814
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
https://linux.oracle.com/cve/CVE-2018-2819.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-3058 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
https://linux.oracle.com/cve/CVE-2018-3058.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-3063 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104786
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
https://linux.oracle.com/cve/CVE-2018-3063.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-3066 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
https://linux.oracle.com/cve/CVE-2018-3066.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-3070 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-3070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
libmysqlclient18 CVE-2018-3081 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104779
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
https://linux.oracle.com/cve/CVE-2018-3081.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
libmysqlclient18 CVE-2018-3133 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
libmysqlclient18 CVE-2018-3174 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105612
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
libmysqlclient18 CVE-2018-3282 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
https://linux.oracle.com/cve/CVE-2018-3282.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
libmysqlclient18 CVE-2017-3302 LOW 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3809
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/01/28/1
http://www.openwall.com/lists/oss-security/2017/02/11/11
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/96162
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
https://linux.oracle.com/cve/CVE-2017-3302.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
libpam-modules CVE-2013-7041 LOW 1.1.8-1ubuntu2 1.1.8-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2013/12/09/16
http://www.openwall.com/lists/oss-security/2013/12/09/5
http://www.securityfocus.com/bid/64180
http://www.ubuntu.com/usn/USN-2935-1
http://www.ubuntu.com/usn/USN-2935-2
http://www.ubuntu.com/usn/USN-2935-3
https://access.redhat.com/security/cve/CVE-2013-7041
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731368
https://bugzilla.redhat.com/show_bug.cgi?id=1038555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7041
https://security.gentoo.org/glsa/201605-05
https://ubuntu.com/security/notices/USN-2935-1
libpam-modules CVE-2014-2583 LOW 1.1.8-1ubuntu2 1.1.8-1ubuntu2.1
Expand...http://secunia.com/advisories/57317
http://www.openwall.com/lists/oss-security/2014/03/24/5
http://www.openwall.com/lists/oss-security/2014/03/26
http://www.openwall.com/lists/oss-security/2014/03/26/10
http://www.openwall.com/lists/oss-security/2014/03/31/6
http://www.securityfocus.com/bid/66493
http://www.ubuntu.com/usn/USN-2935-1
http://www.ubuntu.com/usn/USN-2935-2
http://www.ubuntu.com/usn/USN-2935-3
https://access.redhat.com/security/cve/CVE-2014-2583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583
https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8
https://security.gentoo.org/glsa/201605-05
https://ubuntu.com/security/notices/USN-2935-1
libpam-modules CVE-2015-3238 LOW 1.1.8-1ubuntu2 1.1.8-1ubuntu2.1
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html
http://rhn.redhat.com/errata/RHSA-2015-1640.html
http://www.openwall.com/lists/oss-security/2015/06/25/13
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.securityfocus.com/bid/75428
http://www.ubuntu.com/usn/USN-2935-1
http://www.ubuntu.com/usn/USN-2935-2
http://www.ubuntu.com/usn/USN-2935-3
https://access.redhat.com/security/cve/CVE-2015-3238
https://bugzilla.redhat.com/show_bug.cgi?id=1228571
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238
https://linux.oracle.com/cve/CVE-2015-3238.html
https://linux.oracle.com/errata/ELSA-2015-1640.html
https://security.gentoo.org/glsa/201605-05
https://ubuntu.com/security/notices/USN-2935-1
https://www.redhat.com/archives/pam-list/2015-June/msg00001.html
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551
https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/
libpam-modules-bin CVE-2013-7041 LOW 1.1.8-1ubuntu2 1.1.8-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2013/12/09/16
http://www.openwall.com/lists/oss-security/2013/12/09/5
http://www.securityfocus.com/bid/64180
http://www.ubuntu.com/usn/USN-2935-1
http://www.ubuntu.com/usn/USN-2935-2
http://www.ubuntu.com/usn/USN-2935-3
https://access.redhat.com/security/cve/CVE-2013-7041
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731368
https://bugzilla.redhat.com/show_bug.cgi?id=1038555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7041
https://security.gentoo.org/glsa/201605-05
https://ubuntu.com/security/notices/USN-2935-1
libpam-modules-bin CVE-2014-2583 LOW 1.1.8-1ubuntu2 1.1.8-1ubuntu2.1
Expand...http://secunia.com/advisories/57317
http://www.openwall.com/lists/oss-security/2014/03/24/5
http://www.openwall.com/lists/oss-security/2014/03/26
http://www.openwall.com/lists/oss-security/2014/03/26/10
http://www.openwall.com/lists/oss-security/2014/03/31/6
http://www.securityfocus.com/bid/66493
http://www.ubuntu.com/usn/USN-2935-1
http://www.ubuntu.com/usn/USN-2935-2
http://www.ubuntu.com/usn/USN-2935-3
https://access.redhat.com/security/cve/CVE-2014-2583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583
https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8
https://security.gentoo.org/glsa/201605-05
https://ubuntu.com/security/notices/USN-2935-1
libpam-modules-bin CVE-2015-3238 LOW 1.1.8-1ubuntu2 1.1.8-1ubuntu2.1
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html
http://rhn.redhat.com/errata/RHSA-2015-1640.html
http://www.openwall.com/lists/oss-security/2015/06/25/13
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.securityfocus.com/bid/75428
http://www.ubuntu.com/usn/USN-2935-1
http://www.ubuntu.com/usn/USN-2935-2
http://www.ubuntu.com/usn/USN-2935-3
https://access.redhat.com/security/cve/CVE-2015-3238
https://bugzilla.redhat.com/show_bug.cgi?id=1228571
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238
https://linux.oracle.com/cve/CVE-2015-3238.html
https://linux.oracle.com/errata/ELSA-2015-1640.html
https://security.gentoo.org/glsa/201605-05
https://ubuntu.com/security/notices/USN-2935-1
https://www.redhat.com/archives/pam-list/2015-June/msg00001.html
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551
https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/
libpam-runtime CVE-2013-7041 LOW 1.1.8-1ubuntu2 1.1.8-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2013/12/09/16
http://www.openwall.com/lists/oss-security/2013/12/09/5
http://www.securityfocus.com/bid/64180
http://www.ubuntu.com/usn/USN-2935-1
http://www.ubuntu.com/usn/USN-2935-2
http://www.ubuntu.com/usn/USN-2935-3
https://access.redhat.com/security/cve/CVE-2013-7041
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731368
https://bugzilla.redhat.com/show_bug.cgi?id=1038555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7041
https://security.gentoo.org/glsa/201605-05
https://ubuntu.com/security/notices/USN-2935-1
libpam-runtime CVE-2014-2583 LOW 1.1.8-1ubuntu2 1.1.8-1ubuntu2.1
Expand...http://secunia.com/advisories/57317
http://www.openwall.com/lists/oss-security/2014/03/24/5
http://www.openwall.com/lists/oss-security/2014/03/26
http://www.openwall.com/lists/oss-security/2014/03/26/10
http://www.openwall.com/lists/oss-security/2014/03/31/6
http://www.securityfocus.com/bid/66493
http://www.ubuntu.com/usn/USN-2935-1
http://www.ubuntu.com/usn/USN-2935-2
http://www.ubuntu.com/usn/USN-2935-3
https://access.redhat.com/security/cve/CVE-2014-2583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583
https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8
https://security.gentoo.org/glsa/201605-05
https://ubuntu.com/security/notices/USN-2935-1
libpam-runtime CVE-2015-3238 LOW 1.1.8-1ubuntu2 1.1.8-1ubuntu2.1
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html
http://rhn.redhat.com/errata/RHSA-2015-1640.html
http://www.openwall.com/lists/oss-security/2015/06/25/13
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.securityfocus.com/bid/75428
http://www.ubuntu.com/usn/USN-2935-1
http://www.ubuntu.com/usn/USN-2935-2
http://www.ubuntu.com/usn/USN-2935-3
https://access.redhat.com/security/cve/CVE-2015-3238
https://bugzilla.redhat.com/show_bug.cgi?id=1228571
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238
https://linux.oracle.com/cve/CVE-2015-3238.html
https://linux.oracle.com/errata/ELSA-2015-1640.html
https://security.gentoo.org/glsa/201605-05
https://ubuntu.com/security/notices/USN-2935-1
https://www.redhat.com/archives/pam-list/2015-June/msg00001.html
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551
https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/
libpam0g CVE-2013-7041 LOW 1.1.8-1ubuntu2 1.1.8-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2013/12/09/16
http://www.openwall.com/lists/oss-security/2013/12/09/5
http://www.securityfocus.com/bid/64180
http://www.ubuntu.com/usn/USN-2935-1
http://www.ubuntu.com/usn/USN-2935-2
http://www.ubuntu.com/usn/USN-2935-3
https://access.redhat.com/security/cve/CVE-2013-7041
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731368
https://bugzilla.redhat.com/show_bug.cgi?id=1038555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7041
https://security.gentoo.org/glsa/201605-05
https://ubuntu.com/security/notices/USN-2935-1
libpam0g CVE-2014-2583 LOW 1.1.8-1ubuntu2 1.1.8-1ubuntu2.1
Expand...http://secunia.com/advisories/57317
http://www.openwall.com/lists/oss-security/2014/03/24/5
http://www.openwall.com/lists/oss-security/2014/03/26
http://www.openwall.com/lists/oss-security/2014/03/26/10
http://www.openwall.com/lists/oss-security/2014/03/31/6
http://www.securityfocus.com/bid/66493
http://www.ubuntu.com/usn/USN-2935-1
http://www.ubuntu.com/usn/USN-2935-2
http://www.ubuntu.com/usn/USN-2935-3
https://access.redhat.com/security/cve/CVE-2014-2583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583
https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8
https://security.gentoo.org/glsa/201605-05
https://ubuntu.com/security/notices/USN-2935-1
libpam0g CVE-2015-3238 LOW 1.1.8-1ubuntu2 1.1.8-1ubuntu2.1
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html
http://rhn.redhat.com/errata/RHSA-2015-1640.html
http://www.openwall.com/lists/oss-security/2015/06/25/13
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.securityfocus.com/bid/75428
http://www.ubuntu.com/usn/USN-2935-1
http://www.ubuntu.com/usn/USN-2935-2
http://www.ubuntu.com/usn/USN-2935-3
https://access.redhat.com/security/cve/CVE-2015-3238
https://bugzilla.redhat.com/show_bug.cgi?id=1228571
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238
https://linux.oracle.com/cve/CVE-2015-3238.html
https://linux.oracle.com/errata/ELSA-2015-1640.html
https://security.gentoo.org/glsa/201605-05
https://ubuntu.com/security/notices/USN-2935-1
https://www.redhat.com/archives/pam-list/2015-June/msg00001.html
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551
https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/
libpcre3 CVE-2016-3191 MEDIUM 1:8.31-2ubuntu2.1 1:8.31-2ubuntu2.2
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://vcs.pcre.org/pcre2?view=revision&revision=489
http://vcs.pcre.org/pcre?view=revision&revision=1631
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/84810
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-3191
https://bto.bluecoat.com/security-advisory/sa128
https://bugs.debian.org/815920
https://bugs.debian.org/815921
https://bugs.exim.org/show_bug.cgi?id=1791
https://bugzilla.redhat.com/show_bug.cgi?id=1311503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191
https://linux.oracle.com/cve/CVE-2016-3191.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://ubuntu.com/security/notices/USN-2943-1
https://www.tenable.com/security/tns-2016-18
libpcre3 CVE-2015-2328 LOW 1:8.31-2ubuntu2.1 1:8.31-2ubuntu2.2
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.fortiguard.com/advisory/FG-VD-15-014/
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/74924
https://access.redhat.com/security/cve/CVE-2015-2328
https://bugs.exim.org/show_bug.cgi?id=1515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328
https://jira.mongodb.org/browse/SERVER-17252
https://linux.oracle.com/cve/CVE-2015-2328.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://ubuntu.com/security/notices/USN-2943-1
libpcre3 CVE-2015-8380 LOW 1:8.31-2ubuntu2.1 1:8.31-2ubuntu2.2
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173700.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/77695
https://access.redhat.com/security/cve/CVE-2015-8380
https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html
https://bto.bluecoat.com/security-advisory/sa128
https://bugs.exim.org/show_bug.cgi?id=1637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
libpcre3 CVE-2015-8382 LOW 1:8.31-2ubuntu2.1 1:8.31-2ubuntu2.2
Expand...http://git.php.net/?p=php-src.git;a=commit;h=c351b47ce85a3a147cfa801fa9f0149ab4160834
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510
http://www.openwall.com/lists/oss-security/2015/08/04/2
http://www.openwall.com/lists/oss-security/2015/08/04/3
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/76157
https://access.redhat.com/security/cve/CVE-2015-8382
https://bto.bluecoat.com/security-advisory/sa128
https://bugs.exim.org/show_bug.cgi?id=1537
https://bugzilla.redhat.com/show_bug.cgi?id=1187225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382
https://ubuntu.com/security/notices/USN-2943-1
libpcre3 CVE-2015-8385 LOW 1:8.31-2ubuntu2.1 1:8.31-2ubuntu2.2
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/85572
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8385
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385
https://linux.oracle.com/cve/CVE-2015-8385.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
libpcre3 CVE-2015-8386 LOW 1:8.31-2ubuntu2.1 1:8.31-2ubuntu2.2
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/82990
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8386
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://linux.oracle.com/cve/CVE-2015-8386.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
libpcre3 CVE-2015-8387 LOW 1:8.31-2ubuntu2.1 1:8.31-2ubuntu2.2
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/82990
https://access.redhat.com/security/cve/CVE-2015-8387
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
libpcre3 CVE-2015-8390 LOW 1:8.31-2ubuntu2.1 1:8.31-2ubuntu2.2
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/82990
https://access.redhat.com/security/cve/CVE-2015-8390
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
libpcre3 CVE-2015-8391 LOW 1:8.31-2ubuntu2.1 1:8.31-2ubuntu2.2
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/82990
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8391
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://linux.oracle.com/cve/CVE-2015-8391.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
libpcre3 CVE-2015-8393 LOW 1:8.31-2ubuntu2.1 1:8.31-2ubuntu2.2
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/82990
https://access.redhat.com/security/cve/CVE-2015-8393
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
libpcre3 CVE-2015-8394 LOW 1:8.31-2ubuntu2.1 1:8.31-2ubuntu2.2
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/82990
https://access.redhat.com/security/cve/CVE-2015-8394
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
libpng12-0 CVE-2016-10087 LOW 1.2.50-1ubuntu2.14.04.2 1.2.50-1ubuntu2.14.04.3
Expand...http://www.openwall.com/lists/oss-security/2016/12/29/2
http://www.openwall.com/lists/oss-security/2016/12/30/4
http://www.securityfocus.com/bid/95157
https://access.redhat.com/security/cve/CVE-2016-10087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-74
https://sourceforge.net/p/libpng/code/ci/243d4e5f3fe71740d52a53cf3dd77cc83a3430ba
https://sourceforge.net/p/libpng/code/ci/794a15fad6add4d636369d0b46f603a02995b2e2/ (libpng12)
https://sourceforge.net/p/libpng/code/ci/812768d7a9c973452222d454634496b25ed415eb (libpng16)
https://ubuntu.com/security/notices/USN-3712-1
https://ubuntu.com/security/notices/USN-3712-2
https://usn.ubuntu.com/3712-1/
https://usn.ubuntu.com/3712-2/
libprocps3 CVE-2018-1122 MEDIUM 1:3.3.9-1ubuntu2.2 1:3.3.9-1ubuntu2.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/errata/RHSA-2019:2189
https://access.redhat.com/errata/RHSA-2020:0595
https://access.redhat.com/security/cve/CVE-2018-1122
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1122
https://linux.oracle.com/cve/CVE-2018-1122.html
https://linux.oracle.com/errata/ELSA-2019-2189.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://security.gentoo.org/glsa/201805-14
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-3
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-3/
https://www.debian.org/security/2018/dsa-4208
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
libprocps3 CVE-2018-1123 MEDIUM 1:3.3.9-1ubuntu2.2 1:3.3.9-1ubuntu2.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1123
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://security.gentoo.org/glsa/201805-14
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-3
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-3/
https://www.debian.org/security/2018/dsa-4208
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
libprocps3 CVE-2018-1124 MEDIUM 1:3.3.9-1ubuntu2.2 1:3.3.9-1ubuntu2.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
http://www.securitytracker.com/id/1041057
https://access.redhat.com/errata/RHSA-2018:1700
https://access.redhat.com/errata/RHSA-2018:1777
https://access.redhat.com/errata/RHSA-2018:1820
https://access.redhat.com/errata/RHSA-2018:2267
https://access.redhat.com/errata/RHSA-2018:2268
https://access.redhat.com/errata/RHSA-2019:1944
https://access.redhat.com/errata/RHSA-2019:2401
https://access.redhat.com/security/cve/CVE-2018-1124
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://kc.mcafee.com/corporate/index?page=content&id=SB10241
https://linux.oracle.com/cve/CVE-2018-1124.html
https://linux.oracle.com/errata/ELSA-2018-1777.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://security.gentoo.org/glsa/201805-14
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-2
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-2/
https://www.debian.org/security/2018/dsa-4208
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
libprocps3 CVE-2018-1125 MEDIUM 1:3.3.9-1ubuntu2.2 1:3.3.9-1ubuntu2.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1125
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-3
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-3/
https://www.debian.org/security/2018/dsa-4208
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
libprocps3 CVE-2018-1126 MEDIUM 1:3.3.9-1ubuntu2.2 1:3.3.9-1ubuntu2.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
http://www.securitytracker.com/id/1041057
https://access.redhat.com/errata/RHSA-2018:1700
https://access.redhat.com/errata/RHSA-2018:1777
https://access.redhat.com/errata/RHSA-2018:1820
https://access.redhat.com/errata/RHSA-2018:2267
https://access.redhat.com/errata/RHSA-2018:2268
https://access.redhat.com/errata/RHSA-2019:1944
https://access.redhat.com/security/cve/CVE-2018-1126
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1126
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-1126.html
https://linux.oracle.com/errata/ELSA-2018-1777.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-2
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-2/
https://www.debian.org/security/2018/dsa-4208
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
libpython2.7-minimal CVE-2016-0772 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/9
http://www.securityfocus.com/bid/91225
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-0772
https://bugzilla.redhat.com/show_bug.cgi?id=1303647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://hg.python.org/cpython/rev/b3ce713fb9be
https://hg.python.org/cpython/rev/d590114c2394
https://linux.oracle.com/cve/CVE-2016-0772.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
libpython2.7-minimal CVE-2016-1000110 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2016-1000110
https://bugs.python.org/issue27568
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110
https://linux.oracle.com/cve/CVE-2016-1000110.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/
https://security-tracker.debian.org/tracker/CVE-2016-1000110
https://ubuntu.com/security/notices/USN-3134-1
libpython2.7-minimal CVE-2016-5636 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-2586.html
http://www.openwall.com/lists/oss-security/2016/06/15/15
http://www.openwall.com/lists/oss-security/2016/06/16/1
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91247
http://www.securitytracker.com/id/1038138
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5636
https://bugs.python.org/issue26171
https://bugs.python.org/msg278228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://linux.oracle.com/cve/CVE-2016-5636.html
https://linux.oracle.com/errata/ELSA-2016-2586.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
libpython2.7-minimal CVE-2016-5699 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/7
http://www.openwall.com/lists/oss-security/2016/06/15/12
http://www.openwall.com/lists/oss-security/2016/06/16/2
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91226
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5699
https://bugs.python.org/issue22928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4
https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS
https://hg.python.org/cpython/rev/1c45047c5102
https://hg.python.org/cpython/rev/bf3e1c9b80e9
https://linux.oracle.com/cve/CVE-2016-5699.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://ubuntu.com/security/notices/USN-3134-1
libpython2.7-minimal CVE-2017-1000158 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.4
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.debian.org/security/2018/dsa-4307
libpython2.7-minimal CVE-2018-1000802 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2018-1000802
https://bugs.python.org/issue34540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802
https://github.com/python/cpython/pull/8985
https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
libpython2.7-minimal CVE-2018-14647 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securityfocus.com/bid/105396
http://www.securitytracker.com/id/1041740
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:2030
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-14647
https://bugs.python.org/issue34623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647
https://linux.oracle.com/cve/CVE-2018-14647.html
https://linux.oracle.com/errata/ELSA-2019-2030.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
libpython2.7-minimal CVE-2018-1000030 LOW 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
libpython2.7-minimal CVE-2018-1060 LOW 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1060
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1060.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
https://www.oracle.com/security-alerts/cpujan2020.html
libpython2.7-minimal CVE-2018-1061 LOW 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1061
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1061.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
libpython2.7-stdlib CVE-2016-0772 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/9
http://www.securityfocus.com/bid/91225
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-0772
https://bugzilla.redhat.com/show_bug.cgi?id=1303647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://hg.python.org/cpython/rev/b3ce713fb9be
https://hg.python.org/cpython/rev/d590114c2394
https://linux.oracle.com/cve/CVE-2016-0772.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
libpython2.7-stdlib CVE-2016-1000110 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2016-1000110
https://bugs.python.org/issue27568
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110
https://linux.oracle.com/cve/CVE-2016-1000110.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/
https://security-tracker.debian.org/tracker/CVE-2016-1000110
https://ubuntu.com/security/notices/USN-3134-1
libpython2.7-stdlib CVE-2016-5636 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-2586.html
http://www.openwall.com/lists/oss-security/2016/06/15/15
http://www.openwall.com/lists/oss-security/2016/06/16/1
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91247
http://www.securitytracker.com/id/1038138
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5636
https://bugs.python.org/issue26171
https://bugs.python.org/msg278228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://linux.oracle.com/cve/CVE-2016-5636.html
https://linux.oracle.com/errata/ELSA-2016-2586.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
libpython2.7-stdlib CVE-2016-5699 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/7
http://www.openwall.com/lists/oss-security/2016/06/15/12
http://www.openwall.com/lists/oss-security/2016/06/16/2
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91226
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5699
https://bugs.python.org/issue22928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4
https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS
https://hg.python.org/cpython/rev/1c45047c5102
https://hg.python.org/cpython/rev/bf3e1c9b80e9
https://linux.oracle.com/cve/CVE-2016-5699.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://ubuntu.com/security/notices/USN-3134-1
libpython2.7-stdlib CVE-2017-1000158 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.4
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.debian.org/security/2018/dsa-4307
libpython2.7-stdlib CVE-2018-1000802 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2018-1000802
https://bugs.python.org/issue34540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802
https://github.com/python/cpython/pull/8985
https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
libpython2.7-stdlib CVE-2018-14647 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securityfocus.com/bid/105396
http://www.securitytracker.com/id/1041740
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:2030
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-14647
https://bugs.python.org/issue34623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647
https://linux.oracle.com/cve/CVE-2018-14647.html
https://linux.oracle.com/errata/ELSA-2019-2030.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
libpython2.7-stdlib CVE-2018-1000030 LOW 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
libpython2.7-stdlib CVE-2018-1060 LOW 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1060
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1060.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
https://www.oracle.com/security-alerts/cpujan2020.html
libpython2.7-stdlib CVE-2018-1061 LOW 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1061
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1061.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
libpython3.4-minimal CVE-2016-0772 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/9
http://www.securityfocus.com/bid/91225
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-0772
https://bugzilla.redhat.com/show_bug.cgi?id=1303647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://hg.python.org/cpython/rev/b3ce713fb9be
https://hg.python.org/cpython/rev/d590114c2394
https://linux.oracle.com/cve/CVE-2016-0772.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
libpython3.4-minimal CVE-2016-1000110 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2016-1000110
https://bugs.python.org/issue27568
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110
https://linux.oracle.com/cve/CVE-2016-1000110.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/
https://security-tracker.debian.org/tracker/CVE-2016-1000110
https://ubuntu.com/security/notices/USN-3134-1
libpython3.4-minimal CVE-2016-5636 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-2586.html
http://www.openwall.com/lists/oss-security/2016/06/15/15
http://www.openwall.com/lists/oss-security/2016/06/16/1
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91247
http://www.securitytracker.com/id/1038138
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5636
https://bugs.python.org/issue26171
https://bugs.python.org/msg278228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://linux.oracle.com/cve/CVE-2016-5636.html
https://linux.oracle.com/errata/ELSA-2016-2586.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
libpython3.4-minimal CVE-2016-5699 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/7
http://www.openwall.com/lists/oss-security/2016/06/15/12
http://www.openwall.com/lists/oss-security/2016/06/16/2
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91226
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5699
https://bugs.python.org/issue22928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4
https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS
https://hg.python.org/cpython/rev/1c45047c5102
https://hg.python.org/cpython/rev/bf3e1c9b80e9
https://linux.oracle.com/cve/CVE-2016-5699.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://ubuntu.com/security/notices/USN-3134-1
libpython3.4-minimal CVE-2017-1000158 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.6
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.debian.org/security/2018/dsa-4307
libpython3.4-minimal CVE-2018-1000802 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2018-1000802
https://bugs.python.org/issue34540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802
https://github.com/python/cpython/pull/8985
https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
libpython3.4-minimal CVE-2018-14647 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securityfocus.com/bid/105396
http://www.securitytracker.com/id/1041740
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:2030
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-14647
https://bugs.python.org/issue34623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647
https://linux.oracle.com/cve/CVE-2018-14647.html
https://linux.oracle.com/errata/ELSA-2019-2030.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
libpython3.4-minimal CVE-2018-1060 LOW 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1060
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1060.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
https://www.oracle.com/security-alerts/cpujan2020.html
libpython3.4-minimal CVE-2018-1061 LOW 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1061
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1061.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
libpython3.4-stdlib CVE-2016-0772 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/9
http://www.securityfocus.com/bid/91225
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-0772
https://bugzilla.redhat.com/show_bug.cgi?id=1303647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://hg.python.org/cpython/rev/b3ce713fb9be
https://hg.python.org/cpython/rev/d590114c2394
https://linux.oracle.com/cve/CVE-2016-0772.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
libpython3.4-stdlib CVE-2016-1000110 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2016-1000110
https://bugs.python.org/issue27568
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110
https://linux.oracle.com/cve/CVE-2016-1000110.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/
https://security-tracker.debian.org/tracker/CVE-2016-1000110
https://ubuntu.com/security/notices/USN-3134-1
libpython3.4-stdlib CVE-2016-5636 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-2586.html
http://www.openwall.com/lists/oss-security/2016/06/15/15
http://www.openwall.com/lists/oss-security/2016/06/16/1
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91247
http://www.securitytracker.com/id/1038138
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5636
https://bugs.python.org/issue26171
https://bugs.python.org/msg278228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://linux.oracle.com/cve/CVE-2016-5636.html
https://linux.oracle.com/errata/ELSA-2016-2586.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
libpython3.4-stdlib CVE-2016-5699 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/7
http://www.openwall.com/lists/oss-security/2016/06/15/12
http://www.openwall.com/lists/oss-security/2016/06/16/2
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91226
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5699
https://bugs.python.org/issue22928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4
https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS
https://hg.python.org/cpython/rev/1c45047c5102
https://hg.python.org/cpython/rev/bf3e1c9b80e9
https://linux.oracle.com/cve/CVE-2016-5699.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://ubuntu.com/security/notices/USN-3134-1
libpython3.4-stdlib CVE-2017-1000158 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.6
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.debian.org/security/2018/dsa-4307
libpython3.4-stdlib CVE-2018-1000802 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2018-1000802
https://bugs.python.org/issue34540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802
https://github.com/python/cpython/pull/8985
https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
libpython3.4-stdlib CVE-2018-14647 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securityfocus.com/bid/105396
http://www.securitytracker.com/id/1041740
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:2030
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-14647
https://bugs.python.org/issue34623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647
https://linux.oracle.com/cve/CVE-2018-14647.html
https://linux.oracle.com/errata/ELSA-2019-2030.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
libpython3.4-stdlib CVE-2018-1060 LOW 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1060
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1060.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
https://www.oracle.com/security-alerts/cpujan2020.html
libpython3.4-stdlib CVE-2018-1061 LOW 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1061
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1061.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
libroken18-heimdal CVE-2017-11103 MEDIUM 1.6~git20131207+dfsg-1ubuntu1.1 1.6~git20131207+dfsg-1ubuntu1.2
Expand...http://www.debian.org/security/2017/dsa-3912
http://www.h5l.org/advisories.html?show=2017-07-11
http://www.securityfocus.com/bid/99551
http://www.securitytracker.com/id/1038876
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-11103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
https://orpheus-lyre.info/
https://support.apple.com/HT208112
https://support.apple.com/HT208144
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3353-1
https://ubuntu.com/security/notices/USN-3353-2
https://ubuntu.com/security/notices/USN-3353-3
https://ubuntu.com/security/notices/USN-3353-4
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc
https://www.orpheus-lyre.info/
https://www.samba.org/samba/security/CVE-2017-11103.html
librtmp0 CVE-2015-8270 MEDIUM 2.4+20121230.gitdf6c518-1 2.4+20121230.gitdf6c518-1ubuntu0.1
Expand...http://www.debian.org/security/2017/dsa-3850
http://www.securityfocus.com/bid/95126
http://www.talosintelligence.com/reports/TALOS-2016-0066/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8270
https://ubuntu.com/security/notices/USN-3283-1
https://ubuntu.com/security/notices/USN-3283-2
librtmp0 CVE-2015-8271 MEDIUM 2.4+20121230.gitdf6c518-1 2.4+20121230.gitdf6c518-1ubuntu0.1
Expand...http://www.debian.org/security/2017/dsa-3850
http://www.securityfocus.com/bid/95125
http://www.talosintelligence.com/reports/TALOS-2016-0067/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8271
https://ubuntu.com/security/notices/USN-3283-1
https://ubuntu.com/security/notices/USN-3283-2
librtmp0 CVE-2015-8272 MEDIUM 2.4+20121230.gitdf6c518-1 2.4+20121230.gitdf6c518-1ubuntu0.1
Expand...http://www.debian.org/security/2017/dsa-3850
http://www.securityfocus.com/bid/95123
http://www.talosintelligence.com/reports/TALOS-2016-0068/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8272
https://ubuntu.com/security/notices/USN-3283-1
https://ubuntu.com/security/notices/USN-3283-2
libsqlite3-0 CVE-2018-8740 LOW 3.8.2-1ubuntu2.1 3.8.2-1ubuntu2.2
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html
http://www.securityfocus.com/bid/103466
https://access.redhat.com/security/cve/CVE-2018-8740
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964
https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
https://ubuntu.com/security/notices/USN-4205-1
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4205-1/
https://usn.ubuntu.com/4394-1/
https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema
https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b
libssl1.0.0 CVE-2016-2107 HIGH 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.19
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://source.android.com/security/bulletin/2016-07-01.html
http://support.citrix.com/article/CTX212736
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html
http://www.debian.org/security/2016/dsa-3566
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/89760
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035721
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
http://www.ubuntu.com/usn/USN-2959-1
https://access.redhat.com/security/cve/CVE-2016-2107
https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/
https://bto.bluecoat.com/security-advisory/sa123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107
https://git.openssl.org/?p=openssl.git;a=commit;h=68595c0c2886e7942a14f98c17a55a88afb6c292
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
https://kc.mcafee.com/corporate/index?page=content&id=SB10160
https://linux.oracle.com/cve/CVE-2016-2107.html
https://linux.oracle.com/errata/ELSA-2016-3571.html
https://openssl.org/news/secadv/20160503.txt
https://security.gentoo.org/glsa/201612-16
https://security.netapp.com/advisory/ntap-20160504-0001/
https://support.apple.com/HT206903
https://ubuntu.com/security/notices/USN-2959-1
https://www.exploit-db.com/exploits/39768/
https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
https://www.openssl.org/news/secadv/20160503.txt
https://www.tenable.com/security/tns-2016-18
libssl1.0.0 CVE-2016-2108 HIGH 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.19
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-2056.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://source.android.com/security/bulletin/2016-07-01.html
http://support.citrix.com/article/CTX212736
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
http://www.debian.org/security/2016/dsa-3566
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/89752
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035721
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
http://www.ubuntu.com/usn/USN-2959-1
https://access.redhat.com/errata/RHSA-2016:1137
https://access.redhat.com/errata/RHSA-2017:0193
https://access.redhat.com/errata/RHSA-2017:0194
https://access.redhat.com/security/cve/CVE-2016-2108
https://bto.bluecoat.com/security-advisory/sa123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108
https://git.openssl.org/?p=openssl.git;a=commit;h=3661bb4e7934668bd99ca777ea8b30eedfafa871
https://git.openssl.org/?p=openssl.git;a=commit;h=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
https://linux.oracle.com/cve/CVE-2016-2108.html
https://linux.oracle.com/errata/ELSA-2016-3571.html
https://openssl.org/news/secadv/20160503.txt
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067&languageid=en-fr
https://security.gentoo.org/glsa/201612-16
https://security.netapp.com/advisory/ntap-20160504-0001/
https://support.apple.com/HT206903
https://ubuntu.com/security/notices/USN-2959-1
https://www.openssl.org/news/secadv/20160503.txt
https://www.tenable.com/security/tns-2016-18
libssl1.0.0 CVE-2016-6304 HIGH 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://rhn.redhat.com/errata/RHSA-2016-2802.html
http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/fulldisclosure/2016/Dec/47
http://seclists.org/fulldisclosure/2016/Oct/62
http://seclists.org/fulldisclosure/2017/Jul/31
http://security.360.cn/cve/CVE-2016-6304/
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/93150
http://www.securitytracker.com/id/1036878
http://www.securitytracker.com/id/1037640
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/security/cve/CVE-2016-6304
https://bto.bluecoat.com/security-advisory/sa132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304
https://git.openssl.org/?p=openssl.git;a=commit;h=2c0d295e26306e15a92eb23a84a1802005c1c137
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://linux.oracle.com/cve/CVE-2016-6304.html
https://linux.oracle.com/errata/ELSA-2016-3621.html
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://security.gentoo.org/glsa/201612-16
https://ubuntu.com/security/notices/USN-3087-1
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.openssl.org/news/secadv/20160922.txt
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
libssl1.0.0 CVE-2016-2109 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.19
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-2056.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
http://www.debian.org/security/2016/dsa-3566
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/87940
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035721
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
http://www.ubuntu.com/usn/USN-2959-1
https://access.redhat.com/security/cve/CVE-2016-2109
https://bto.bluecoat.com/security-advisory/sa123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109
https://git.openssl.org/?p=openssl.git;a=commit;h=c62981390d6cf9e3d612c489b8b77c2913b25807
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
https://kc.mcafee.com/corporate/index?page=content&id=SB10160
https://linux.oracle.com/cve/CVE-2016-2109.html
https://linux.oracle.com/errata/ELSA-2016-3576.html
https://openssl.org/news/secadv/20160503.txt
https://security.gentoo.org/glsa/201612-16
https://security.netapp.com/advisory/ntap-20160504-0001/
https://source.android.com/security/bulletin/2017-07-01
https://support.apple.com/HT206903
https://ubuntu.com/security/notices/USN-2959-1
https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
https://www.openssl.org/news/secadv/20160503.txt
https://www.tenable.com/security/tns-2016-18
libssl1.0.0 CVE-2016-2842 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.18
Expand...http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=bugtraq&m=146108058503441&w=2
http://openssl.org/news/secadv/20160301.txt
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/84169
https://access.redhat.com/security/cve/CVE-2016-2842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2842
https://git.openssl.org/?p=openssl.git;a=commit;h=578b956fe741bf8e84055547b1e83c28dd902c73
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kc.mcafee.com/corporate/index?page=content&id=SB10152
https://linux.oracle.com/cve/CVE-2016-2842.html
https://linux.oracle.com/errata/ELSA-2016-3571.html
https://security.netapp.com/advisory/ntap-20160321-0001/
libssl1.0.0 CVE-2016-6303 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/92984
http://www.securitytracker.com/id/1036885
https://access.redhat.com/security/cve/CVE-2016-6303
https://bto.bluecoat.com/security-advisory/sa132
https://bugzilla.redhat.com/show_bug.cgi?id=1370146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303
https://git.openssl.org/?p=openssl.git;a=commit;h=55d83bf7c10c7b205fffa23fa7c3977491e56c07
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://ubuntu.com/security/notices/USN-3087-1
https://www.openssl.org/news/secadv/20160922.txt
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
libssl1.0.0 CVE-2016-6306 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/93153
http://www.securitytracker.com/id/1036885
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
https://access.redhat.com/security/cve/CVE-2016-6306
https://bto.bluecoat.com/security-advisory/sa132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306
https://git.openssl.org/?p=openssl.git;a=commit;h=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://linux.oracle.com/cve/CVE-2016-6306.html
https://linux.oracle.com/errata/ELSA-2016-3627.html
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://security.gentoo.org/glsa/201612-16
https://support.f5.com/csp/article/K90492697
https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://ubuntu.com/security/notices/USN-3087-1
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.openssl.org/news/secadv/20160922.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
libssl1.0.0 CVE-2016-7056 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.22
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://www.securityfocus.com/bid/95375
http://www.securitytracker.com/id/1037575
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/security/cve/CVE-2016-7056
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7056
https://eprint.iacr.org/2016/1195
https://eprint.iacr.org/2016/1195.pdf
https://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/033_libcrypto.patch.sig
https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/016_libcrypto.patch.sig
https://git.openssl.org/?p=openssl.git;a=commit;h=8aed2a7548362e88e84a7feb795a3a97e8395008
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7056.html
https://seclists.org/oss-sec/2017/q1/52
https://security-tracker.debian.org/tracker/CVE-2016-7056
https://ubuntu.com/security/notices/USN-3181-1
https://www.debian.org/security/2017/dsa-3773
libssl1.0.0 CVE-2017-3731 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.22
Expand...http://rhn.redhat.com/errata/RHSA-2017-0286.html
http://www.debian.org/security/2017/dsa-3773
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/95813
http://www.securitytracker.com/id/1037717
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
https://access.redhat.com/security/cve/CVE-2017-3731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731
https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21
https://linux.oracle.com/cve/CVE-2017-3731.html
https://linux.oracle.com/errata/ELSA-2017-0286.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc
https://security.gentoo.org/glsa/201702-07
https://security.netapp.com/advisory/ntap-20171019-0002/
https://security.paloaltonetworks.com/CVE-2017-3731
https://source.android.com/security/bulletin/pixel/2017-11-01
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us
https://ubuntu.com/security/notices/USN-3181-1
https://www.openssl.org/news/secadv/20170126.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.tenable.com/security/tns-2017-04
libssl1.0.0 CVE-2018-0739 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.24
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103518
http://www.securityfocus.com/bid/105609
http://www.securitytracker.com/id/1040576
https://access.redhat.com/errata/RHSA-2018:3090
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/errata/RHSA-2019:1711
https://access.redhat.com/errata/RHSA-2019:1712
https://access.redhat.com/security/cve/CVE-2018-0739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9310d45087ae546e27e61ddf8f6367f29848220d
https://linux.oracle.com/cve/CVE-2018-0739.html
https://linux.oracle.com/errata/ELSA-2018-4228.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00033.html
https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/
https://security.gentoo.org/glsa/201811-21
https://security.gentoo.org/glsa/202007-53
https://security.netapp.com/advisory/ntap-20180330-0002/
https://security.netapp.com/advisory/ntap-20180726-0002/
https://securityadvisories.paloaltonetworks.com/Home/Detail/133
https://ubuntu.com/security/notices/USN-3611-1
https://ubuntu.com/security/notices/USN-3611-2
https://usn.ubuntu.com/3611-1/
https://usn.ubuntu.com/3611-2/
https://www.debian.org/security/2018/dsa-4157
https://www.debian.org/security/2018/dsa-4158
https://www.openssl.org/news/secadv/20180327.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-04
https://www.tenable.com/security/tns-2018-06
https://www.tenable.com/security/tns-2018-07
libssl1.0.0 CVE-2016-0702 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.18
Expand...http://cachebleed.info
http://cachebleed.info/
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
http://marc.info/?l=bugtraq&m=145889460330120&w=2
http://openssl.org/news/secadv/20160301.txt
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
http://www.debian.org/security/2016/dsa-3500
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securitytracker.com/id/1035133
http://www.ubuntu.com/usn/USN-2914-1
https://access.redhat.com/security/cve/CVE-2016-0702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702
https://git.openssl.org/?p=openssl.git;a=commit;h=708dc2f1291e104fe4eef810bb8ffc1fae5b19c1
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
https://linux.oracle.com/cve/CVE-2016-0702.html
https://linux.oracle.com/errata/ELSA-2016-0301.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
https://security.gentoo.org/glsa/201603-15
https://ssrg.nicta.com.au/projects/TS/cachebleed/
https://ubuntu.com/security/notices/USN-2914-1
https://www.openssl.org/news/secadv/20160301.txt
libssl1.0.0 CVE-2016-0705 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.18
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
http://marc.info/?l=bugtraq&m=145889460330120&w=2
http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=bugtraq&m=146108058503441&w=2
http://openssl.org/news/secadv/20160301.txt
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://source.android.com/security/bulletin/2016-05-01.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
http://www.debian.org/security/2016/dsa-3500
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/83754
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035133
http://www.ubuntu.com/usn/USN-2914-1
https://access.redhat.com/errata/RHSA-2018:2568
https://access.redhat.com/errata/RHSA-2018:2575
https://access.redhat.com/errata/RHSA-2018:2713
https://access.redhat.com/security/cve/CVE-2016-0705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705
https://git.openssl.org/?p=openssl.git;a=commit;h=6c88c71b4e4825c7bc0489306d062d017634eb88
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
https://linux.oracle.com/cve/CVE-2016-0705.html
https://linux.oracle.com/errata/ELSA-2016-0301.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
https://security.gentoo.org/glsa/201603-15
https://ubuntu.com/security/notices/USN-2914-1
https://www.openssl.org/news/secadv/20160301.txt
libssl1.0.0 CVE-2016-0797 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.18
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
http://marc.info/?l=bugtraq&m=145889460330120&w=2
http://openssl.org/news/secadv/20160301.txt
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
http://www.debian.org/security/2016/dsa-3500
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/83763
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035133
http://www.ubuntu.com/usn/USN-2914-1
https://access.redhat.com/security/cve/CVE-2016-0797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797
https://git.openssl.org/?p=openssl.git;a=commit;h=c175308407858afff3fc8c2e5e085d94d12edc7d
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
https://kc.mcafee.com/corporate/index?page=content&id=SB10156
https://linux.oracle.com/cve/CVE-2016-0797.html
https://linux.oracle.com/errata/ELSA-2016-0302.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
https://security.gentoo.org/glsa/201603-15
https://ubuntu.com/security/notices/USN-2914-1
https://www.openssl.org/news/secadv/20160301.txt
libssl1.0.0 CVE-2016-0798 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.18
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
http://openssl.org/news/secadv/20160301.txt
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
http://www.debian.org/security/2016/dsa-3500
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/83705
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035133
http://www.ubuntu.com/usn/USN-2914-1
https://access.redhat.com/security/cve/CVE-2016-0798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798
https://git.openssl.org/?p=openssl.git;a=commit;h=259b664f950c2ba66fbf4b0fe5281327904ead21
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
https://security.gentoo.org/glsa/201603-15
https://ubuntu.com/security/notices/USN-2914-1
https://www.openssl.org/news/secadv/20160301.txt
libssl1.0.0 CVE-2016-0799 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.18
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=bugtraq&m=146108058503441&w=2
http://openssl.org/news/secadv/20160301.txt
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
http://www.debian.org/security/2016/dsa-3500
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/83755
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035133
http://www.ubuntu.com/usn/USN-2914-1
https://access.redhat.com/security/cve/CVE-2016-0799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799
https://git.openssl.org/?p=openssl.git;a=commit;h=578b956fe741bf8e84055547b1e83c28dd902c73
https://guidovranken.wordpress.com/2016/02/27/openssl-cve-2016-0799-heap-corruption-via-bio_printf/
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
https://linux.oracle.com/cve/CVE-2016-0799.html
https://linux.oracle.com/errata/ELSA-2016-3576.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
https://security.gentoo.org/glsa/201603-15
https://ubuntu.com/security/notices/USN-2914-1
https://www.openssl.org/news/secadv/20160301.txt
libssl1.0.0 CVE-2016-2105 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.19
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-1648.html
http://rhn.redhat.com/errata/RHSA-2016-1649.html
http://rhn.redhat.com/errata/RHSA-2016-1650.html
http://rhn.redhat.com/errata/RHSA-2016-2056.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
http://www.debian.org/security/2016/dsa-3566
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/89757
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035721
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
http://www.ubuntu.com/usn/USN-2959-1
https://access.redhat.com/security/cve/CVE-2016-2105
https://bto.bluecoat.com/security-advisory/sa123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105
https://git.openssl.org/?p=openssl.git;a=commit;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kc.mcafee.com/corporate/index?page=content&id=SB10160
https://linux.oracle.com/cve/CVE-2016-2105.html
https://linux.oracle.com/errata/ELSA-2016-3576.html
https://openssl.org/news/secadv/20160503.txt
https://security.gentoo.org/glsa/201612-16
https://security.netapp.com/advisory/ntap-20160504-0001/
https://source.android.com/security/bulletin/pixel/2017-11-01
https://support.apple.com/HT206903
https://ubuntu.com/security/notices/USN-2959-1
https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
https://www.openssl.org/news/secadv/20160503.txt
https://www.tenable.com/security/tns-2016-18
libssl1.0.0 CVE-2016-2106 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.19
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-1648.html
http://rhn.redhat.com/errata/RHSA-2016-1649.html
http://rhn.redhat.com/errata/RHSA-2016-1650.html
http://rhn.redhat.com/errata/RHSA-2016-2056.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
http://www.debian.org/security/2016/dsa-3566
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/89744
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035721
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
http://www.ubuntu.com/usn/USN-2959-1
https://access.redhat.com/security/cve/CVE-2016-2106
https://bto.bluecoat.com/security-advisory/sa123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106
https://git.openssl.org/?p=openssl.git;a=commit;h=3f3582139fbb259a1c3cbb0a25236500a409bf26
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
https://kc.mcafee.com/corporate/index?page=content&id=SB10160
https://linux.oracle.com/cve/CVE-2016-2106.html
https://linux.oracle.com/errata/ELSA-2016-3576.html
https://openssl.org/news/secadv/20160503.txt
https://security.gentoo.org/glsa/201612-16
https://security.netapp.com/advisory/ntap-20160504-0001/
https://source.android.com/security/bulletin/pixel/2017-11-01
https://support.apple.com/HT206903
https://ubuntu.com/security/notices/USN-2959-1
https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
https://www.openssl.org/news/secadv/20160503.txt
https://www.tenable.com/security/tns-2016-18
libssl1.0.0 CVE-2016-2177 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.22
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.openwall.com/lists/oss-security/2016/06/08/9
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/540957/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540957/100/0/threaded
http://www.securityfocus.com/bid/91319
http://www.securitytracker.com/id/1036088
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3181-1
https://access.redhat.com/errata/RHSA-2017:0193
https://access.redhat.com/errata/RHSA-2017:0194
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/security/cve/CVE-2016-2177
https://bto.bluecoat.com/security-advisory/sa132
https://bugzilla.redhat.com/show_bug.cgi?id=1341705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177
https://git.openssl.org/?p=openssl.git;a=commit;h=a004e72b95835136d3f1ea90517f706c24c03da7
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03763en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10165
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://linux.oracle.com/cve/CVE-2016-2177.html
https://linux.oracle.com/errata/ELSA-2016-3627.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://security.gentoo.org/glsa/201612-16
https://support.f5.com/csp/article/K23873366
https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3181-1
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager
https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/
https://www.openssl.org/news/secadv/20160922.txt
https://www.schneider-electric.com/en/download/document/SEVD-2018-137-01/
https://www.schneider-electric.com/en/download/document/SEVD-2018-144-01/
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
libssl1.0.0 CVE-2016-2178 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://eprint.iacr.org/2016/594
http://eprint.iacr.org/2016/594.pdf
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/oss-sec/2016/q2/493
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.openwall.com/lists/oss-security/2016/06/08/10
http://www.openwall.com/lists/oss-security/2016/06/08/11
http://www.openwall.com/lists/oss-security/2016/06/08/12
http://www.openwall.com/lists/oss-security/2016/06/08/2
http://www.openwall.com/lists/oss-security/2016/06/08/4
http://www.openwall.com/lists/oss-security/2016/06/08/5
http://www.openwall.com/lists/oss-security/2016/06/08/6
http://www.openwall.com/lists/oss-security/2016/06/08/7
http://www.openwall.com/lists/oss-security/2016/06/08/8
http://www.openwall.com/lists/oss-security/2016/06/09/2
http://www.openwall.com/lists/oss-security/2016/06/09/8
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/91081
http://www.securitytracker.com/id/1036054
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
https://access.redhat.com/errata/RHSA-2017:0193
https://access.redhat.com/errata/RHSA-2017:0194
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/security/cve/CVE-2016-2178
https://bto.bluecoat.com/security-advisory/sa132
https://bugzilla.redhat.com/show_bug.cgi?id=1343400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178
https://git.openssl.org/?p=openssl.git;a=commit;h=399944622df7bd81af62e67ea967c470534090e2
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://linux.oracle.com/cve/CVE-2016-2178.html
https://linux.oracle.com/errata/ELSA-2016-3627.html
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://security.gentoo.org/glsa/201612-16
https://support.f5.com/csp/article/K53084033
https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://ubuntu.com/security/notices/USN-3087-1
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.openssl.org/news/secadv/20160922.txt
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
libssl1.0.0 CVE-2016-2179 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/92987
http://www.securitytracker.com/id/1036689
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-2179
https://bto.bluecoat.com/security-advisory/sa132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179
https://git.openssl.org/?p=openssl.git;a=commit;h=f5c7f5dfbaf0d2f7d946d0fe86f08e6bcb36ed0d
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://linux.oracle.com/cve/CVE-2016-2179.html
https://linux.oracle.com/errata/ELSA-2016-3621.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://ubuntu.com/security/notices/USN-3087-1
https://www.openssl.org/news/secadv/20160922.txt
https://www.openssl.org/news/vulnerabilities.html#y2017
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
libssl1.0.0 CVE-2016-2180 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/92117
http://www.securitytracker.com/id/1036486
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-2180
https://bto.bluecoat.com/security-advisory/sa132
https://bugzilla.redhat.com/show_bug.cgi?id=1359615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180
https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://linux.oracle.com/cve/CVE-2016-2180.html
https://linux.oracle.com/errata/ELSA-2016-3621.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://security.gentoo.org/glsa/201612-16
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://ubuntu.com/security/notices/USN-3087-1
https://www.openssl.org/news/secadv/20160922.txt
https://www.openssl.org/news/vulnerabilities.html#y2017
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
libssl1.0.0 CVE-2016-2181 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/92982
http://www.securitytracker.com/id/1036690
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
https://access.redhat.com/security/cve/CVE-2016-2181
https://bto.bluecoat.com/security-advisory/sa132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181
https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://linux.oracle.com/cve/CVE-2016-2181.html
https://linux.oracle.com/errata/ELSA-2016-3621.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://support.f5.com/csp/article/K59298921
https://ubuntu.com/security/notices/USN-3087-1
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.openssl.org/news/secadv/20160922.txt
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
libssl1.0.0 CVE-2016-2182 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/92557
http://www.securitytracker.com/id/1036688
http://www.securitytracker.com/id/1037968
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
https://access.redhat.com/security/cve/CVE-2016-2182
https://bto.bluecoat.com/security-advisory/sa132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182
https://git.openssl.org/?p=openssl.git;a=commit;h=07bed46f332fce8c1d157689a2cdf915a982ae34
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://linux.oracle.com/cve/CVE-2016-2182.html
https://linux.oracle.com/errata/ELSA-2016-3627.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://source.android.com/security/bulletin/2017-03-01
https://source.android.com/security/bulletin/2017-03-01.html
https://support.f5.com/csp/article/K01276005
https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3087-2
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.openssl.org/news/secadv/20160922.txt
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
libssl1.0.0 CVE-2016-2183 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://rhn.redhat.com/errata/RHSA-2017-0462.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/fulldisclosure/2017/May/105
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/542005/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
http://www.securityfocus.com/bid/92630
http://www.securityfocus.com/bid/95568
http://www.securitytracker.com/id/1036696
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3179-1
http://www.ubuntu.com/usn/USN-3194-1
http://www.ubuntu.com/usn/USN-3198-1
http://www.ubuntu.com/usn/USN-3270-1
http://www.ubuntu.com/usn/USN-3372-1
https://access.redhat.com/articles/2548661
https://access.redhat.com/errata/RHSA-2016:1940
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2018:2123
https://access.redhat.com/errata/RHSA-2019:1245
https://access.redhat.com/errata/RHSA-2019:2859
https://access.redhat.com/errata/RHSA-2020:0451
https://access.redhat.com/security/cve/CVE-2016-2183
https://access.redhat.com/security/cve/cve-2016-2183
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
https://bto.bluecoat.com/security-advisory/sa133
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
https://community.qualys.com/thread/16555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
https://linux.oracle.com/cve/CVE-2016-2183.html
https://linux.oracle.com/errata/ELSA-2018-2123.html
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
https://seclists.org/bugtraq/2018/Nov/21
https://security-tracker.debian.org/tracker/CVE-2016-2183
https://security.gentoo.org/glsa/201612-16
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20160915-0001/
https://security.netapp.com/advisory/ntap-20170119-0001/
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
https://support.f5.com/csp/article/K13167034
https://sweet32.info/
https://twitter.com/symantec/status/768786631159603200
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://ubuntu.com/security/notices/USN-3270-1
https://ubuntu.com/security/notices/USN-3372-1
https://wiki.opendaylight.org/view/Security_Advisories
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.exploit-db.com/exploits/42091/
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
https://www.tenable.com/security/tns-2017-09
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
libssl1.0.0 CVE-2016-6302 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/92628
http://www.securitytracker.com/id/1036885
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
https://access.redhat.com/security/cve/CVE-2016-6302
https://bto.bluecoat.com/security-advisory/sa132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://linux.oracle.com/cve/CVE-2016-6302.html
https://linux.oracle.com/errata/ELSA-2016-3621.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://ubuntu.com/security/notices/USN-3087-1
https://www.openssl.org/news/secadv/20160922.txt
https://www.openssl.org/news/vulnerabilities.html#y2017
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
libssl1.0.0 CVE-2016-8610 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.22
Expand...http://rhn.redhat.com/errata/RHSA-2017-0286.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/oss-sec/2016/q4/224
http://security.360.cn/cve/CVE-2016-8610
http://security.360.cn/cve/CVE-2016-8610/
http://www.openwall.com/lists/oss-security/2016/10/24/3
http://www.securityfocus.com/bid/93841
http://www.securitytracker.com/id/1037084
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/security/cve/CVE-2016-8610
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401
https://linux.oracle.com/cve/CVE-2016-8610.html
https://linux.oracle.com/errata/ELSA-2017-0574.html
https://security.360.cn/cve/CVE-2016-8610/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc
https://security.netapp.com/advisory/ntap-20171130-0001/
https://security.paloaltonetworks.com/CVE-2016-8610
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us
https://ubuntu.com/security/notices/USN-3181-1
https://ubuntu.com/security/notices/USN-3183-1
https://ubuntu.com/security/notices/USN-3183-2
https://www.debian.org/security/2017/dsa-3773
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
libssl1.0.0 CVE-2017-3735 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.23
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/100515
http://www.securitytracker.com/id/1039726
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/security/cve/CVE-2017-3735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735
https://github.com/openssl/openssl/commit/068b963bb7afc57f5bdd723de0dd15e7795d5822
https://linux.oracle.com/cve/CVE-2017-3735.html
https://linux.oracle.com/errata/ELSA-2018-4187.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00011.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc
https://security.gentoo.org/glsa/201712-03
https://security.netapp.com/advisory/ntap-20170927-0001/
https://security.netapp.com/advisory/ntap-20171107-0002/
https://support.apple.com/HT208331
https://ubuntu.com/security/notices/USN-3475-1
https://ubuntu.com/security/notices/USN-3611-2
https://usn.ubuntu.com/3611-2/
https://www.debian.org/security/2017/dsa-4017
https://www.debian.org/security/2017/dsa-4018
https://www.openssl.org/news/secadv/20170828.txt
https://www.openssl.org/news/secadv/20171102.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2017-14
https://www.tenable.com/security/tns-2017-15
libssl1.0.0 CVE-2018-0495 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.26
Expand...http://www.securitytracker.com/id/1041144
http://www.securitytracker.com/id/1041147
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1296
https://access.redhat.com/errata/RHSA-2019:1297
https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/errata/RHSA-2019:2237
https://access.redhat.com/security/cve/CVE-2018-0495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495
https://dev.gnupg.org/T4011
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.38_release_notes
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965
https://linux.oracle.com/cve/CVE-2018-0495.html
https://linux.oracle.com/errata/ELSA-2019-2237.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
https://ubuntu.com/security/notices/USN-3689-1
https://ubuntu.com/security/notices/USN-3689-2
https://ubuntu.com/security/notices/USN-3692-1
https://ubuntu.com/security/notices/USN-3692-2
https://ubuntu.com/security/notices/USN-3850-1
https://ubuntu.com/security/notices/USN-3850-2
https://usn.ubuntu.com/3689-1/
https://usn.ubuntu.com/3689-2/
https://usn.ubuntu.com/3692-1/
https://usn.ubuntu.com/3692-2/
https://usn.ubuntu.com/3850-1/
https://usn.ubuntu.com/3850-2/
https://www.debian.org/security/2018/dsa-4231
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
libssl1.0.0 CVE-2018-0732 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.26
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104442
http://www.securitytracker.com/id/1041090
https://access.redhat.com/errata/RHSA-2018:2552
https://access.redhat.com/errata/RHSA-2018:2553
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1296
https://access.redhat.com/errata/RHSA-2019:1297
https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/security/cve/CVE-2018-0732
https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4
https://linux.oracle.com/cve/CVE-2018-0732.html
https://linux.oracle.com/errata/ELSA-2018-4249.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
https://security.gentoo.org/glsa/201811-03
https://security.netapp.com/advisory/ntap-20181105-0001/
https://security.netapp.com/advisory/ntap-20190118-0002/
https://securityadvisories.paloaltonetworks.com/Home/Detail/133
https://ubuntu.com/security/notices/USN-3692-1
https://ubuntu.com/security/notices/USN-3692-2
https://usn.ubuntu.com/3692-1/
https://usn.ubuntu.com/3692-2/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.openssl.org/news/secadv/20180612.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2018-12
https://www.tenable.com/security/tns-2018-13
https://www.tenable.com/security/tns-2018-14
https://www.tenable.com/security/tns-2018-17
libssl1.0.0 CVE-2018-0734 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
http://www.securityfocus.com/bid/105758
https://access.redhat.com/errata/RHSA-2019:2304
https://access.redhat.com/errata/RHSA-2019:3700
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/security/cve/CVE-2018-0734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=43e6a58d4991a451daf4891ff05a48735df871ac
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7
https://linux.oracle.com/cve/CVE-2018-0734.html
https://linux.oracle.com/errata/ELSA-2019-3700.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
https://nvd.nist.gov/vuln/detail/CVE-2018-0734
https://security.netapp.com/advisory/ntap-20181105-0002/
https://security.netapp.com/advisory/ntap-20190118-0002/
https://security.netapp.com/advisory/ntap-20190423-0002/
https://ubuntu.com/security/notices/USN-3840-1
https://usn.ubuntu.com/3840-1/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.openssl.org/news/secadv/20181030.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-16
https://www.tenable.com/security/tns-2018-17
libssl1.0.0 CVE-2018-0737 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.26
Expand...http://www.openwall.com/lists/oss-security/2018/04/16/3
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103766
http://www.securitytracker.com/id/1040685
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/security/cve/CVE-2018-0737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787
https://linux.oracle.com/cve/CVE-2018-0737.html
https://linux.oracle.com/errata/ELSA-2018-4249.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
https://security.gentoo.org/glsa/201811-21
https://security.netapp.com/advisory/ntap-20180726-0003/
https://securityadvisories.paloaltonetworks.com/Home/Detail/133
https://ubuntu.com/security/notices/USN-3628-1
https://ubuntu.com/security/notices/USN-3628-2
https://ubuntu.com/security/notices/USN-3692-1
https://ubuntu.com/security/notices/USN-3692-2
https://usn.ubuntu.com/3628-1/
https://usn.ubuntu.com/3628-2/
https://usn.ubuntu.com/3692-1/
https://usn.ubuntu.com/3692-2/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.openssl.org/news/secadv/20180416.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-12
https://www.tenable.com/security/tns-2018-13
https://www.tenable.com/security/tns-2018-14
https://www.tenable.com/security/tns-2018-17
libssl1.0.0 CVE-2018-5407 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.27
Expand...http://www.securityfocus.com/bid/105897
https://access.redhat.com/errata/RHSA-2019:0483
https://access.redhat.com/errata/RHSA-2019:0651
https://access.redhat.com/errata/RHSA-2019:0652
https://access.redhat.com/errata/RHSA-2019:2125
https://access.redhat.com/errata/RHSA-2019:3929
https://access.redhat.com/errata/RHSA-2019:3931
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/security/cve/CVE-2018-5407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407
https://eprint.iacr.org/2018/1060.pdf
https://github.com/bbbrumley/portsmash
https://linux.oracle.com/cve/CVE-2018-5407.html
https://linux.oracle.com/errata/ELSA-2019-2125.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
https://security.gentoo.org/glsa/201903-10
https://security.netapp.com/advisory/ntap-20181126-0001/
https://support.f5.com/csp/article/K49711130?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3840-1
https://usn.ubuntu.com/3840-1/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.exploit-db.com/exploits/45785/
https://www.openssl.org/news/secadv/20181112.txt
https://www.openwall.com/lists/oss-security/2018/11/01/4
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-16
https://www.tenable.com/security/tns-2018-17
libtasn1-6 CVE-2016-4008 MEDIUM 3.4-3ubuntu0.3 3.4-3ubuntu0.4
Expand...http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html
http://www.debian.org/security/2016/dsa-3568
http://www.openwall.com/lists/oss-security/2016/04/11/3
http://www.ubuntu.com/usn/USN-2957-1
http://www.ubuntu.com/usn/USN-2957-2
https://access.redhat.com/security/cve/CVE-2016-4008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008
https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html
https://security.gentoo.org/glsa/201703-05
https://ubuntu.com/security/notices/USN-2957-1
https://ubuntu.com/security/notices/USN-2957-2
libtasn1-6 CVE-2017-6891 MEDIUM 3.4-3ubuntu0.3 3.4-3ubuntu0.5
Expand...http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.debian.org/security/2017/dsa-3861
http://www.securityfocus.com/bid/98641
http://www.securitytracker.com/id/1038619
https://access.redhat.com/security/cve/CVE-2017-6891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6891
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://secuniaresearch.flexerasoftware.com/advisories/76125/
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/
https://security.gentoo.org/glsa/201710-11
https://ubuntu.com/security/notices/USN-3309-1
https://ubuntu.com/security/notices/USN-3309-2
libtasn1-6 CVE-2017-10790 LOW 3.4-3ubuntu0.3 3.4-3ubuntu0.6
Expand...https://access.redhat.com/security/cve/CVE-2017-10790
https://bugzilla.redhat.com/show_bug.cgi?id=1464141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html
https://security.gentoo.org/glsa/201710-11
https://ubuntu.com/security/notices/USN-3547-1
https://usn.ubuntu.com/3547-1/
https://www.debian.org/security/2018/dsa-4106
libudev1 CVE-2018-1049 MEDIUM 204-5ubuntu20.15 204-5ubuntu20.26
Expand...http://www.securitytracker.com/id/1041520
https://access.redhat.com/errata/RHSA-2018:0260
https://access.redhat.com/security/cve/CVE-2018-1049
https://bugzilla.redhat.com/show_bug.cgi?id=1534701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049
https://github.com/systemd/systemd/pull/5916
https://linux.oracle.com/cve/CVE-2018-1049.html
https://linux.oracle.com/errata/ELSA-2018-0260.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html
https://ubuntu.com/security/notices/USN-3558-1
https://usn.ubuntu.com/3558-1/
libudev1 CVE-2019-3842 MEDIUM 204-5ubuntu20.15 204-5ubuntu20.31
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html
https://access.redhat.com/security/cve/CVE-2019-3842
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842
https://linux.oracle.com/cve/CVE-2019-3842.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
https://nvd.nist.gov/vuln/detail/CVE-2019-3842
https://ubuntu.com/security/notices/USN-3938-1
https://www.exploit-db.com/exploits/46743/
libwind0-heimdal CVE-2017-11103 MEDIUM 1.6~git20131207+dfsg-1ubuntu1.1 1.6~git20131207+dfsg-1ubuntu1.2
Expand...http://www.debian.org/security/2017/dsa-3912
http://www.h5l.org/advisories.html?show=2017-07-11
http://www.securityfocus.com/bid/99551
http://www.securitytracker.com/id/1038876
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-11103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
https://orpheus-lyre.info/
https://support.apple.com/HT208112
https://support.apple.com/HT208144
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3353-1
https://ubuntu.com/security/notices/USN-3353-2
https://ubuntu.com/security/notices/USN-3353-3
https://ubuntu.com/security/notices/USN-3353-4
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc
https://www.orpheus-lyre.info/
https://www.samba.org/samba/security/CVE-2017-11103.html
libx11-6 CVE-2018-14598 MEDIUM 2:1.6.2-1ubuntu2 2:1.6.2-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2018/08/21/6
http://www.securityfocus.com/bid/105177
http://www.securitytracker.com/id/1041543
https://access.redhat.com/errata/RHSA-2019:2079
https://access.redhat.com/security/cve/CVE-2018-14598
https://bugzilla.suse.com/show_bug.cgi?id=1102073
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=e83722768fd5c467ef61fa159e8c6278770b45c2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598
https://linux.oracle.com/cve/CVE-2018-14598.html
https://linux.oracle.com/errata/ELSA-2019-2079.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGARUV66TS5OOSLR5A76BUB7SDV6GO4F/
https://lists.x.org/archives/xorg-announce/2018-August/002916.html
https://security.gentoo.org/glsa/201811-01
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libx11-6 CVE-2018-14599 MEDIUM 2:1.6.2-1ubuntu2 2:1.6.2-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2018/08/21/6
http://www.securityfocus.com/bid/105177
http://www.securitytracker.com/id/1041543
https://access.redhat.com/errata/RHSA-2019:2079
https://access.redhat.com/security/cve/CVE-2018-14599
https://bugzilla.suse.com/show_bug.cgi?id=1102062
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=b469da1430cdcee06e31c6251b83aede072a1ff0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599
https://linux.oracle.com/cve/CVE-2018-14599.html
https://linux.oracle.com/errata/ELSA-2019-2079.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGARUV66TS5OOSLR5A76BUB7SDV6GO4F/
https://lists.x.org/archives/xorg-announce/2018-August/002916.html
https://security.gentoo.org/glsa/201811-01
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libx11-6 CVE-2018-14600 MEDIUM 2:1.6.2-1ubuntu2 2:1.6.2-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2018/08/21/6
http://www.securityfocus.com/bid/105177
http://www.securitytracker.com/id/1041543
https://access.redhat.com/errata/RHSA-2019:2079
https://access.redhat.com/security/cve/CVE-2018-14600
https://bugzilla.suse.com/show_bug.cgi?id=1102068
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=dbf72805fd9d7b1846fe9a11b46f3994bfc27fea
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600
https://linux.oracle.com/cve/CVE-2018-14600.html
https://linux.oracle.com/errata/ELSA-2019-2079.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html
https://lists.x.org/archives/xorg-announce/2018-August/002916.html
https://security.gentoo.org/glsa/201811-01
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libx11-6 CVE-2016-7942 LOW 2:1.6.2-1ubuntu2 2:1.6.2-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93363
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7942
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libx11-6 CVE-2016-7943 LOW 2:1.6.2-1ubuntu2 2:1.6.2-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93362
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7943
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libx11-data CVE-2018-14598 MEDIUM 2:1.6.2-1ubuntu2 2:1.6.2-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2018/08/21/6
http://www.securityfocus.com/bid/105177
http://www.securitytracker.com/id/1041543
https://access.redhat.com/errata/RHSA-2019:2079
https://access.redhat.com/security/cve/CVE-2018-14598
https://bugzilla.suse.com/show_bug.cgi?id=1102073
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=e83722768fd5c467ef61fa159e8c6278770b45c2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598
https://linux.oracle.com/cve/CVE-2018-14598.html
https://linux.oracle.com/errata/ELSA-2019-2079.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGARUV66TS5OOSLR5A76BUB7SDV6GO4F/
https://lists.x.org/archives/xorg-announce/2018-August/002916.html
https://security.gentoo.org/glsa/201811-01
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libx11-data CVE-2018-14599 MEDIUM 2:1.6.2-1ubuntu2 2:1.6.2-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2018/08/21/6
http://www.securityfocus.com/bid/105177
http://www.securitytracker.com/id/1041543
https://access.redhat.com/errata/RHSA-2019:2079
https://access.redhat.com/security/cve/CVE-2018-14599
https://bugzilla.suse.com/show_bug.cgi?id=1102062
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=b469da1430cdcee06e31c6251b83aede072a1ff0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599
https://linux.oracle.com/cve/CVE-2018-14599.html
https://linux.oracle.com/errata/ELSA-2019-2079.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGARUV66TS5OOSLR5A76BUB7SDV6GO4F/
https://lists.x.org/archives/xorg-announce/2018-August/002916.html
https://security.gentoo.org/glsa/201811-01
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libx11-data CVE-2018-14600 MEDIUM 2:1.6.2-1ubuntu2 2:1.6.2-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2018/08/21/6
http://www.securityfocus.com/bid/105177
http://www.securitytracker.com/id/1041543
https://access.redhat.com/errata/RHSA-2019:2079
https://access.redhat.com/security/cve/CVE-2018-14600
https://bugzilla.suse.com/show_bug.cgi?id=1102068
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=dbf72805fd9d7b1846fe9a11b46f3994bfc27fea
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600
https://linux.oracle.com/cve/CVE-2018-14600.html
https://linux.oracle.com/errata/ELSA-2019-2079.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html
https://lists.x.org/archives/xorg-announce/2018-August/002916.html
https://security.gentoo.org/glsa/201811-01
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libx11-data CVE-2016-7942 LOW 2:1.6.2-1ubuntu2 2:1.6.2-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93363
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7942
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libx11-data CVE-2016-7943 LOW 2:1.6.2-1ubuntu2 2:1.6.2-1ubuntu2.1
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93362
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7943
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libxml2 CVE-2016-1762 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00005.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/85059
http://www.securitytracker.com/id/1035353
http://www.ubuntu.com/usn/USN-2994-1
http://xmlsoft.org/news.html
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-1762
https://bugzilla.gnome.org/show_bug.cgi?id=759671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762
https://git.gnome.org/browse/libxml2/commit/?id=a7a94612aa3b16779e2c74e1fa353b5d9786c602
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-1762.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://support.apple.com/HT206166
https://support.apple.com/HT206167
https://support.apple.com/HT206168
https://support.apple.com/HT206169
https://support.apple.com/HT206171
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
libxml2 CVE-2016-1833 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/90691
http://www.securitytracker.com/id/1035890
http://www.ubuntu.com/usn/USN-2994-1
http://xmlsoft.org/news.html
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-1833
https://bugs.chromium.org/p/project-zero/issues/detail?id=636
https://bugzilla.gnome.org/show_bug.cgi?id=758606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833
https://git.gnome.org/browse/libxml2/commit/?id=0bcd05c5cd83dec3406c8f68b769b1d610c72f76
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-1833.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://support.apple.com/HT206564
https://support.apple.com/HT206566
https://support.apple.com/HT206567
https://support.apple.com/HT206568
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-1834 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/90691
http://www.securitytracker.com/id/1035890
http://www.ubuntu.com/usn/USN-2994-1
http://xmlsoft.org/news.html
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-1834
https://bugzilla.gnome.org/show_bug.cgi?id=763071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834
https://git.gnome.org/browse/libxml2/commit/?id=8fbbf5513d609c1770b391b99e33314cd0742704
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-1834.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://support.apple.com/HT206564
https://support.apple.com/HT206566
https://support.apple.com/HT206567
https://support.apple.com/HT206568
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-1835 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/90696
http://www.securitytracker.com/id/1035890
http://www.ubuntu.com/usn/USN-2994-1
http://xmlsoft.org/news.html
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-1835
https://bugzilla.gnome.org/show_bug.cgi?id=759020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835
https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9f60551906fb
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-1835.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://support.apple.com/HT206567
https://support.apple.com/HT206568
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-1836 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/90691
http://www.securitytracker.com/id/1035890
http://www.ubuntu.com/usn/USN-2994-1
http://xmlsoft.org/news.html
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-1836
https://bugzilla.gnome.org/show_bug.cgi?id=759398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1836
https://git.gnome.org/browse/libxml2/commit/?id=45752d2c334b50016666d8f0ec3691e2d680f0a0
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-1836.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://security.gentoo.org/glsa/201701-37
https://support.apple.com/HT206564
https://support.apple.com/HT206566
https://support.apple.com/HT206567
https://support.apple.com/HT206568
https://support.apple.com/HT206899
https://support.apple.com/HT206901
https://support.apple.com/HT206902
https://support.apple.com/HT206903
https://support.apple.com/HT206904
https://support.apple.com/HT206905
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-1837 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/90691
http://www.securitytracker.com/id/1035890
http://www.ubuntu.com/usn/USN-2994-1
http://xmlsoft.org/news.html
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-1837
https://bugzilla.gnome.org/show_bug.cgi?id=760263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837
https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-1837.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://support.apple.com/HT206564
https://support.apple.com/HT206566
https://support.apple.com/HT206567
https://support.apple.com/HT206568
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-1838 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/90691
http://www.securitytracker.com/id/1035890
http://www.ubuntu.com/usn/USN-2994-1
http://xmlsoft.org/news.html
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-1838
https://bugs.chromium.org/p/project-zero/issues/detail?id=639
https://bugzilla.gnome.org/show_bug.cgi?id=758588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838
https://git.gnome.org/browse/libxml2/commit/?id=db07dd613e461df93dde7902c6505629bf0734e9
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-1838.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://security.gentoo.org/glsa/201701-37
https://support.apple.com/HT206564
https://support.apple.com/HT206566
https://support.apple.com/HT206567
https://support.apple.com/HT206568
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-1839 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/90691
http://www.securitytracker.com/id/1035890
http://www.securitytracker.com/id/1038623
http://www.ubuntu.com/usn/USN-2994-1
http://xmlsoft.org/news.html
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-1839
https://bugzilla.gnome.org/show_bug.cgi?id=758605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839
https://git.gnome.org/browse/libxml2/commit/?id=a820dbeac29d330bae4be05d9ecd939ad6b4aa33
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-1839.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://security.gentoo.org/glsa/201701-37
https://support.apple.com/HT206564
https://support.apple.com/HT206566
https://support.apple.com/HT206567
https://support.apple.com/HT206568
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-1840 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/90691
http://www.securitytracker.com/id/1035890
http://www.ubuntu.com/usn/USN-2994-1
http://xmlsoft.org/news.html
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-1840
https://bugzilla.gnome.org/show_bug.cgi?id=757711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840
https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-1840.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://security.gentoo.org/glsa/201701-37
https://support.apple.com/HT206564
https://support.apple.com/HT206566
https://support.apple.com/HT206567
https://support.apple.com/HT206568
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-4658 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.9
Expand...http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
http://www.securityfocus.com/bid/93054
http://www.securitytracker.com/id/1036858
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2016-4658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658
https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b
https://github.com/advisories/GHSA-fr52-4hqw-p27f
https://github.com/sparklemotion/nokogiri/issues/1615
https://linux.oracle.com/cve/CVE-2016-4658.html
https://linux.oracle.com/errata/ELSA-2021-3810.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4658
https://security.gentoo.org/glsa/201701-37
https://support.apple.com/HT207141
https://support.apple.com/HT207142
https://support.apple.com/HT207143
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3235-1
libxml2 CVE-2016-5131 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.9
Expand...http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1485.html
http://www.debian.org/security/2016/dsa-3637
http://www.securityfocus.com/bid/92053
http://www.securitytracker.com/id/1036428
http://www.securitytracker.com/id/1038623
http://www.ubuntu.com/usn/USN-3041-1
https://access.redhat.com/security/cve/CVE-2016-5131
https://bugzilla.redhat.com/show_bug.cgi?id=1358641
https://codereview.chromium.org/2127493002
https://crbug.com/623378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131
https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
https://linux.oracle.com/cve/CVE-2016-5131.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://security.gentoo.org/glsa/201610-09
https://security.gentoo.org/glsa/201701-37
https://source.android.com/security/bulletin/2017-05-01
https://support.apple.com/HT207141
https://support.apple.com/HT207142
https://support.apple.com/HT207143
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3041-1
https://ubuntu.com/security/notices/USN-3235-1
libxml2 CVE-2017-0663 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.10
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.securityfocus.com/bid/98877
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2017-0663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0663
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://source.android.com/security/bulletin/2017-06-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
libxml2 CVE-2017-15412 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.12
Expand...http://www.securitytracker.com/id/1040348
https://access.redhat.com/errata/RHSA-2017:3401
https://access.redhat.com/errata/RHSA-2018:0287
https://access.redhat.com/security/cve/CVE-2017-15412
https://bugzilla.gnome.org/show_bug.cgi?id=783160
https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
https://crbug.com/727039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412
https://github.com/sparklemotion/nokogiri/issues/1714
https://linux.oracle.com/cve/CVE-2017-15412.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00014.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-15412.html
https://security.gentoo.org/glsa/201801-03
https://ubuntu.com/security/notices/USN-3513-1
https://ubuntu.com/security/notices/USN-3513-2
https://usn.ubuntu.com/usn/usn-3513-1/
https://www.debian.org/security/2018/dsa-4086
libxml2 CVE-2017-7375 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.10
Expand...http://www.securityfocus.com/bid/98877
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2017-7375
https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa
https://bugzilla.redhat.com/show_bug.cgi?id=1462203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7375
https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e
https://security.gentoo.org/glsa/201711-01
https://source.android.com/security/bulletin/2017-06-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://www.debian.org/security/2017/dsa-3952
libxml2 CVE-2017-7376 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.10
Expand...http://www.securityfocus.com/bid/98877
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2017-7376
https://android.googlesource.com/platform/external/libxml2/+/51e0cb2e5ec18eaf6fb331bc573ff27b743898f4
https://bugzilla.redhat.com/show_bug.cgi?id=1462216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7376
https://git.gnome.org/browse/libxml2/commit/?id=5dca9eea1bd4263bfa4d037ab2443de1cd730f7e
https://source.android.com/security/bulletin/2017-06-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://www.debian.org/security/2017/dsa-3952
libxml2 CVE-2017-9047 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.10
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98599
https://access.redhat.com/security/cve/CVE-2017-9047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
libxml2 CVE-2017-9048 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.10
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98556
https://access.redhat.com/security/cve/CVE-2017-9048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
libxml2 CVE-2017-9049 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.10
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98601
https://access.redhat.com/security/cve/CVE-2017-9049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
libxml2 CVE-2017-9050 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.10
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98568
https://access.redhat.com/security/cve/CVE-2017-9050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050
https://github.com/advisories/GHSA-8c56-cpmw-89x7
https://github.com/sparklemotion/nokogiri/issues/1673
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-9050
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-0663.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7375.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7376.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9047.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9048.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9049.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9050.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://usn.ubuntu.com/usn/usn-3424-1/
libxml2 CVE-2018-14404 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.13
Expand...https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/security/cve/CVE-2018-14404
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817
https://bugzilla.redhat.com/show_bug.cgi?id=1595985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404
https://github.com/advisories/GHSA-6qvp-r6r3-9p7h
https://github.com/sparklemotion/nokogiri/issues/1785
https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594
https://gitlab.gnome.org/GNOME/libxml2/issues/10
https://groups.google.com/forum/#!msg/ruby-security-ann/uVrmO2HjqQw/Fw3ocLI0BQAJ
https://linux.oracle.com/cve/CVE-2018-14404.html
https://linux.oracle.com/errata/ELSA-2020-1827.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2018-14404
https://security.netapp.com/advisory/ntap-20190719-0002/
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
libxml2 CVE-2018-14567 MEDIUM 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.13
Expand...http://www.securityfocus.com/bid/105198
https://access.redhat.com/security/cve/CVE-2018-14567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567
https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
https://linux.oracle.com/cve/CVE-2018-14567.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
libxml2 CVE-2015-8806 LOW 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://www.openwall.com/lists/oss-security/2016/02/03/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/82071
http://www.ubuntu.com/usn/USN-2994-1
http://www.ubuntu.com/usn/usn-2994-1/
https://access.redhat.com/security/cve/CVE-2015-8806
https://bugzilla.gnome.org/show_bug.cgi?id=749115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8806
https://github.com/advisories/GHSA-7hp2-xwpj-95jq
https://github.com/sparklemotion/nokogiri/commit/03d402212707bd5dfa0a21b7de5e91a7f9d90028
https://github.com/sparklemotion/nokogiri/issues/1473
https://mail.gnome.org/archives/xml/2016-May/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2015-8806
https://security.gentoo.org/glsa/201701-37
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
libxml2 CVE-2016-2073 LOW 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://www.openwall.com/lists/oss-security/2016/01/25/6
http://www.openwall.com/lists/oss-security/2016/01/26/7
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/85267
http://www.securitytracker.com/id/1035011
http://www.ubuntu.com/usn/USN-2994-1
https://access.redhat.com/security/cve/CVE-2016-2073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2073
https://security.gentoo.org/glsa/201701-37
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
libxml2 CVE-2016-3627 LOW 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://seclists.org/fulldisclosure/2016/May/10
http://www.openwall.com/lists/oss-security/2016/03/21/2
http://www.openwall.com/lists/oss-security/2016/03/21/3
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/84992
http://www.securitytracker.com/id/1035335
http://www.ubuntu.com/usn/USN-2994-1
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-3627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-3627.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://security.gentoo.org/glsa/201701-37
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-3705 LOW 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://seclists.org/fulldisclosure/2016/May/10
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/89854
http://www.ubuntu.com/usn/USN-2994-1
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-3705
https://bugzilla.gnome.org/show_bug.cgi?id=765207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-3705.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://security.gentoo.org/glsa/201701-37
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-4447 LOW 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.openwall.com/lists/oss-security/2016/05/25/2
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/90864
http://www.securitytracker.com/id/1036348
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722
http://www.ubuntu.com/usn/USN-2994-1
http://xmlsoft.org/news.html
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-4447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447
https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-4447.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://support.apple.com/HT206899
https://support.apple.com/HT206901
https://support.apple.com/HT206902
https://support.apple.com/HT206903
https://support.apple.com/HT206904
https://support.apple.com/HT206905
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-4448 LOW 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.9
Expand...http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.openwall.com/lists/oss-security/2016/05/25/2
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/90856
http://www.securitytracker.com/id/1036348
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722
http://xmlsoft.org/news.html
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-4448
https://bugzilla.redhat.com/show_bug.cgi?id=1338700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448
https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9
https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-4448.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://support.apple.com/HT206899
https://support.apple.com/HT206901
https://support.apple.com/HT206902
https://support.apple.com/HT206903
https://support.apple.com/HT206904
https://support.apple.com/HT206905
https://ubuntu.com/security/notices/USN-3235-1
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-4449 LOW 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://jvn.jp/en/jp/JVN17535578/index.html
http://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000066.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.openwall.com/lists/oss-security/2016/05/25/2
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/90865
http://www.securitytracker.com/id/1036348
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722
http://www.ubuntu.com/usn/USN-2994-1
http://xmlsoft.org/news.html
https://access.redhat.com/errata/RHSA-2016:1292
https://access.redhat.com/security/cve/CVE-2016-4449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449
https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
https://linux.oracle.com/cve/CVE-2016-4449.html
https://linux.oracle.com/errata/ELSA-2016-1292.html
https://support.apple.com/HT206899
https://support.apple.com/HT206901
https://support.apple.com/HT206902
https://support.apple.com/HT206903
https://support.apple.com/HT206904
https://support.apple.com/HT206905
https://support.cybozu.com/ja-jp/article/9735
https://ubuntu.com/security/notices/USN-2994-1
https://www.debian.org/security/2016/dsa-3593
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-4483 LOW 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.8
Expand...http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.debian.org/security/2016/dsa-3593
http://www.openwall.com/lists/oss-security/2016/05/03/8
http://www.openwall.com/lists/oss-security/2016/05/04/7
http://www.openwall.com/lists/oss-security/2016/06/07/4
http://www.openwall.com/lists/oss-security/2016/06/07/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/90013
http://www.securitytracker.com/id/1036348
https://access.redhat.com/security/cve/CVE-2016-4483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483
https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-37
https://ubuntu.com/security/notices/USN-2994-1
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-9318 LOW 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.13
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
libxml2 CVE-2017-16932 LOW 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.11
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
libxml2 CVE-2017-18258 LOW 2.9.1+dfsg1-3ubuntu4.7 2.9.1+dfsg1-3ubuntu4.13
Expand...https://access.redhat.com/security/cve/CVE-2017-18258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258
https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb
https://github.com/advisories/GHSA-882p-jqgm-f45g
https://kc.mcafee.com/corporate/index?page=content&id=SB10284
https://linux.oracle.com/cve/CVE-2017-18258.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2017-18258
https://security.netapp.com/advisory/ntap-20190719-0001/
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
login CVE-2016-6252 MEDIUM 1:4.1.5.1-1ubuntu9.1 1:4.1.5.1-1ubuntu9.4
Expand...http://www.debian.org/security/2017/dsa-3793
http://www.openwall.com/lists/oss-security/2016/07/19/6
http://www.openwall.com/lists/oss-security/2016/07/19/7
http://www.openwall.com/lists/oss-security/2016/07/20/2
http://www.openwall.com/lists/oss-security/2016/07/25/7
http://www.securityfocus.com/bid/92055
https://access.redhat.com/security/cve/CVE-2016-6252
https://bugzilla.suse.com/show_bug.cgi?id=979282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252
https://github.com/shadow-maint/shadow/issues/27
https://security.gentoo.org/glsa/201706-02
https://ubuntu.com/security/notices/USN-3276-1
login CVE-2017-2616 MEDIUM 1:4.1.5.1-1ubuntu9.1 1:4.1.5.1-1ubuntu9.4
Expand...http://rhn.redhat.com/errata/RHSA-2017-0654.html
http://www.securityfocus.com/bid/96404
http://www.securitytracker.com/id/1038271
https://access.redhat.com/errata/RHSA-2017:0907
https://access.redhat.com/security/cve/CVE-2017-2616
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616
https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891
https://linux.oracle.com/cve/CVE-2017-2616.html
https://linux.oracle.com/errata/ELSA-2017-0907.html
https://security.gentoo.org/glsa/201706-02
https://ubuntu.com/security/notices/USN-3276-1
https://ubuntu.com/security/notices/USN-3276-3
https://www.debian.org/security/2017/dsa-3793
multiarch-support CVE-2015-7547 HIGH 2.19-0ubuntu6.6 2.19-0ubuntu6.7
Expand...http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html
http://marc.info/?l=bugtraq&m=145596041017029&w=2
http://marc.info/?l=bugtraq&m=145672440608228&w=2
http://marc.info/?l=bugtraq&m=145690841819314&w=2
http://marc.info/?l=bugtraq&m=145857691004892&w=2
http://marc.info/?l=bugtraq&m=146161017210491&w=2
http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://rhn.redhat.com/errata/RHSA-2016-0175.html
http://rhn.redhat.com/errata/RHSA-2016-0176.html
http://rhn.redhat.com/errata/RHSA-2016-0225.html
http://rhn.redhat.com/errata/RHSA-2016-0277.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://seclists.org/fulldisclosure/2021/Sep/0
http://support.citrix.com/article/CTX206991
http://ubuntu.com/usn/usn-2900-1
http://www.debian.org/security/2016/dsa-3480
http://www.debian.org/security/2016/dsa-3481
http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/83265
http://www.securitytracker.com/id/1035020
http://www.vmware.com/security/advisories/VMSA-2016-0002.html
https://access.redhat.com/articles/2161461
https://access.redhat.com/security/cve/CVE-2015-7547
https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
https://bto.bluecoat.com/security-advisory/sa114
https://bugzilla.redhat.com/show_bug.cgi?id=1293532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161
https://kc.mcafee.com/corporate/index?page=content&id=SB10150
https://linux.oracle.com/cve/CVE-2015-7547.html
https://linux.oracle.com/errata/ELSA-2016-0176.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201602-02
https://security.netapp.com/advisory/ntap-20160217-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=18665
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html
https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html
https://support.lenovo.com/us/en/product_security/len_5450
https://ubuntu.com/security/notices/USN-2900-1
https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17
https://www.exploit-db.com/exploits/39454/
https://www.exploit-db.com/exploits/40339/
https://www.kb.cert.org/vuls/id/457759
https://www.tenable.com/security/research/tra-2017-08
multiarch-support CVE-2018-1000001 HIGH 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://seclists.org/oss-sec/2018/q1/38
http://www.openwall.com/lists/oss-security/2018/01/11/5
http://www.securityfocus.com/bid/102525
http://www.securitytracker.com/id/1040162
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/security/cve/CVE-2018-1000001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
https://linux.oracle.com/cve/CVE-2018-1000001.html
https://linux.oracle.com/errata/ELSA-2018-0805.html
https://lists.samba.org/archive/rsync/2018-February/031478.html
https://security.netapp.com/advisory/ntap-20190404-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=18203
https://ubuntu.com/security/notices/USN-3534-1
https://ubuntu.com/security/notices/USN-3536-1
https://usn.ubuntu.com/3534-1/
https://usn.ubuntu.com/3536-1/
https://www.exploit-db.com/exploits/43775/
https://www.exploit-db.com/exploits/44889/
https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
multiarch-support CVE-2015-5277 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://rhn.redhat.com/errata/RHSA-2015-2172.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securityfocus.com/bid/78092
http://www.securitytracker.com/id/1034196
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/security/cve/CVE-2015-5277
https://bugzilla.redhat.com/show_bug.cgi?id=1262914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277
https://linux.oracle.com/cve/CVE-2015-5277.html
https://linux.oracle.com/errata/ELSA-2015-2172.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=17079
https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html
https://ubuntu.com/security/notices/USN-2985-1
multiarch-support CVE-2015-8982 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
multiarch-support CVE-2015-8983 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
multiarch-support CVE-2015-8984 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
multiarch-support CVE-2016-2856 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403
http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html
http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/
http://www.openwall.com/lists/oss-security/2016/02/23/3
http://www.openwall.com/lists/oss-security/2016/03/07/2
http://www.securityfocus.com/bid/84601
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856
https://ubuntu.com/security/notices/USN-2985-1
multiarch-support CVE-2017-1000366 MEDIUM 2.19-0ubuntu6.6 2.19-0ubuntu6.13
Expand...http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.debian.org/security/2017/dsa-3887
http://www.securityfocus.com/bid/99127
http://www.securitytracker.com/id/1038712
https://access.redhat.com/errata/RHSA-2017:1479
https://access.redhat.com/errata/RHSA-2017:1480
https://access.redhat.com/errata/RHSA-2017:1481
https://access.redhat.com/errata/RHSA-2017:1567
https://access.redhat.com/errata/RHSA-2017:1712
https://access.redhat.com/security/cve/CVE-2017-1000366
https://access.redhat.com/security/vulnerabilities/stackguard
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366
https://kc.mcafee.com/corporate/index?page=content&id=SB10205
https://linux.oracle.com/cve/CVE-2017-1000366.html
https://linux.oracle.com/errata/ELSA-2017-1481.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201706-19
https://ubuntu.com/security/notices/USN-3323-1
https://ubuntu.com/security/notices/USN-3323-2
https://www.exploit-db.com/exploits/42274/
https://www.exploit-db.com/exploits/42275/
https://www.exploit-db.com/exploits/42276/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
https://www.suse.com/security/cve/CVE-2017-1000366/
https://www.suse.com/support/kb/doc/?id=7020973
multiarch-support CVE-2013-2207 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://secunia.com/advisories/55113
http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/security/cve/CVE-2013-2207
https://bugzilla.redhat.com/show_bug.cgi?id=976408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=15755
https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html
https://ubuntu.com/security/notices/USN-2985-1
multiarch-support CVE-2014-8121 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://rhn.redhat.com/errata/RHSA-2015-0327.html
http://www.debian.org/security/2016/dsa-3480
http://www.securityfocus.com/bid/73038
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/security/cve/CVE-2014-8121
https://bugzilla.redhat.com/show_bug.cgi?id=1165192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
https://linux.oracle.com/cve/CVE-2014-8121.html
https://linux.oracle.com/errata/ELSA-2015-0327.html
https://security.gentoo.org/glsa/201602-02
https://sourceware.org/ml/libc-alpha/2015-02/msg00617.html
https://ubuntu.com/security/notices/USN-2985-1
multiarch-support CVE-2015-1781 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://www.debian.org/security/2016/dsa-3480
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securityfocus.com/bid/74255
http://www.securitytracker.com/id/1032178
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/security/cve/CVE-2015-1781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
https://linux.oracle.com/cve/CVE-2015-1781.html
https://linux.oracle.com/errata/ELSA-2015-2199.html
https://rhn.redhat.com/errata/RHSA-2015-0863.html
https://security.gentoo.org/glsa/201602-02
https://sourceware.org/bugzilla/show_bug.cgi?id=18287
https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386
https://ubuntu.com/security/notices/USN-2985-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
multiarch-support CVE-2015-8776 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://rhn.redhat.com/errata/RHSA-2017-0680.html
http://www.debian.org/security/2016/dsa-3480
http://www.debian.org/security/2016/dsa-3481
http://www.openwall.com/lists/oss-security/2016/01/19/11
http://www.openwall.com/lists/oss-security/2016/01/20/1
http://www.securityfocus.com/bid/83277
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/errata/RHSA-2017:1916
https://access.redhat.com/security/cve/CVE-2015-8776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
https://linux.oracle.com/cve/CVE-2015-8776.html
https://linux.oracle.com/errata/ELSA-2017-1916.html
https://security.gentoo.org/glsa/201602-02
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=18985
https://ubuntu.com/security/notices/USN-2985-1
https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
multiarch-support CVE-2015-8777 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://www.debian.org/security/2016/dsa-3480
http://www.openwall.com/lists/oss-security/2015/09/05/8
http://www.openwall.com/lists/oss-security/2016/01/20/1
http://www.securityfocus.com/bid/81469
http://www.securitytracker.com/id/1034811
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/errata/RHSA-2017:1916
https://access.redhat.com/security/cve/CVE-2015-8777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
https://linux.oracle.com/cve/CVE-2015-8777.html
https://linux.oracle.com/errata/ELSA-2017-1916.html
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=18928
https://ubuntu.com/security/notices/USN-2985-1
multiarch-support CVE-2015-8778 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://rhn.redhat.com/errata/RHSA-2017-0680.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.debian.org/security/2016/dsa-3480
http://www.debian.org/security/2016/dsa-3481
http://www.openwall.com/lists/oss-security/2016/01/19/11
http://www.openwall.com/lists/oss-security/2016/01/20/1
http://www.securityfocus.com/bid/83275
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/errata/RHSA-2017:1916
https://access.redhat.com/security/cve/CVE-2015-8778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
https://linux.oracle.com/cve/CVE-2015-8778.html
https://linux.oracle.com/errata/ELSA-2017-1916.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201602-02
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=18240
https://ubuntu.com/security/notices/USN-2985-1
https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
multiarch-support CVE-2015-8779 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://rhn.redhat.com/errata/RHSA-2017-0680.html
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.debian.org/security/2016/dsa-3480
http://www.debian.org/security/2016/dsa-3481
http://www.openwall.com/lists/oss-security/2016/01/19/11
http://www.openwall.com/lists/oss-security/2016/01/20/1
http://www.securityfocus.com/bid/82244
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/errata/RHSA-2017:1916
https://access.redhat.com/security/cve/CVE-2015-8779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
https://linux.oracle.com/cve/CVE-2015-8779.html
https://linux.oracle.com/errata/ELSA-2017-1916.html
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201602-02
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=17905
https://ubuntu.com/security/notices/USN-2985-1
https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
multiarch-support CVE-2016-1234 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
multiarch-support CVE-2016-3075 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.8
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://rhn.redhat.com/errata/RHSA-2016-2573.html
http://www.securityfocus.com/bid/85732
http://www.ubuntu.com/usn/USN-2985-1
https://access.redhat.com/security/cve/CVE-2016-3075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075
https://linux.oracle.com/cve/CVE-2016-3075.html
https://linux.oracle.com/errata/ELSA-2016-3638.html
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19879
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=317b199b4aff8cfa27f2302ab404d2bb5032b9a4
https://ubuntu.com/security/notices/USN-2985-1
multiarch-support CVE-2016-3706 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
http://www.securityfocus.com/bid/88440
https://access.redhat.com/security/cve/CVE-2016-3706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20010
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3239-3
multiarch-support CVE-2016-4429 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
multiarch-support CVE-2016-6323 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.10
Expand...http://lists.opensuse.org/opensuse-updates/2016-10/msg00009.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.openwall.com/lists/oss-security/2016/08/18/12
http://www.securityfocus.com/bid/92532
https://access.redhat.com/security/cve/CVE-2016-6323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KTXSOVCRDGBIB4WCIDAGYYUBESXZ4IGK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVWSAZVBTLALXF4SCBPDV3FY6J22DXLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WO7IMEYWZ2WTXGGMZBWWSDCUMFN63XOB/
https://security.gentoo.org/glsa/201706-19
https://sourceware.org/bugzilla/show_bug.cgi?id=20435
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=9e2ff6c9cc54c0b4402b8d49e4abe7000fde7617
https://ubuntu.com/security/notices/USN-3239-1
multiarch-support CVE-2017-1000408 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://seclists.org/oss-sec/2017/q4/385
http://www.openwall.com/lists/oss-security/2017/12/11/4
http://www.openwall.com/lists/oss-security/2019/06/27/7
http://www.openwall.com/lists/oss-security/2019/06/28/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
https://access.redhat.com/security/cve/CVE-2017-1000408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408
https://security.netapp.com/advisory/ntap-20190404-0003/
https://ubuntu.com/security/notices/USN-3534-1
https://www.exploit-db.com/exploits/43331/
multiarch-support CVE-2017-1000409 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://seclists.org/oss-sec/2017/q4/385
http://www.openwall.com/lists/oss-security/2017/12/11/4
https://access.redhat.com/security/cve/CVE-2017-1000409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409
https://security.netapp.com/advisory/ntap-20190404-0003/
https://ubuntu.com/security/notices/USN-3534-1
https://www.exploit-db.com/exploits/43331/
multiarch-support CVE-2017-15670 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://www.securityfocus.com/bid/101521
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/errata/RHSA-2018:1879
https://access.redhat.com/security/cve/CVE-2017-15670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
https://linux.oracle.com/cve/CVE-2017-15670.html
https://linux.oracle.com/errata/ELSA-2018-1879.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22320
https://ubuntu.com/security/notices/USN-3534-1
multiarch-support CVE-2017-15804 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://www.securityfocus.com/bid/101535
https://access.redhat.com/errata/RHSA-2018:0805
https://access.redhat.com/errata/RHSA-2018:1879
https://access.redhat.com/security/cve/CVE-2017-15804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804
https://linux.oracle.com/cve/CVE-2017-15804.html
https://linux.oracle.com/errata/ELSA-2018-1879.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22332
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8
https://ubuntu.com/security/notices/USN-3534-1
multiarch-support CVE-2017-16997 LOW 2.19-0ubuntu6.6 2.19-0ubuntu6.14
Expand...http://www.securityfocus.com/bid/102228
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3092
https://access.redhat.com/security/cve/CVE-2017-16997
https://bugs.debian.org/884615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997
https://linux.oracle.com/cve/CVE-2017-16997.html
https://linux.oracle.com/errata/ELSA-2018-3092.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22625
https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html
https://ubuntu.com/security/notices/USN-3534-1
mysql-client-5.5 CVE-2016-0640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86427
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
https://linux.oracle.com/cve/CVE-2016-0640.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-client-5.5 CVE-2016-0641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86470
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
https://linux.oracle.com/cve/CVE-2016-0641.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-client-5.5 CVE-2016-0642 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3557
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86445
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-client-5.5 CVE-2016-0643 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86486
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
https://linux.oracle.com/cve/CVE-2016-0643.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-client-5.5 CVE-2016-0644 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86442
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
https://linux.oracle.com/cve/CVE-2016-0644.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-client-5.5 CVE-2016-0646 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86436
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
https://linux.oracle.com/cve/CVE-2016-0646.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-client-5.5 CVE-2016-0647 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86495
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
https://linux.oracle.com/cve/CVE-2016-0647.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-client-5.5 CVE-2016-0648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86457
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
https://linux.oracle.com/cve/CVE-2016-0648.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-client-5.5 CVE-2016-0649 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86498
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
https://linux.oracle.com/cve/CVE-2016-0649.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-client-5.5 CVE-2016-0650 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86496
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
https://linux.oracle.com/cve/CVE-2016-0650.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-client-5.5 CVE-2016-0666 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86509
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
https://linux.oracle.com/cve/CVE-2016-0666.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-client-5.5 CVE-2016-2047 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://marc.info/?l=oss-security&m=145379584107459&w=2
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3453
http://www.debian.org/security/2016/dsa-3557
http://www.openwall.com/lists/oss-security/2016/01/26/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/81810
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-2047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41
https://linux.oracle.com/cve/CVE-2016-2047.html
https://linux.oracle.com/errata/ELSA-2016-0534.html
https://mariadb.atlassian.net/browse/MDEV-9212
https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
https://mariadb.com/kb/en/mdb-10023-rn/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-client-5.5 CVE-2016-3477 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91902
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
https://linux.oracle.com/cve/CVE-2016-3477.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-client-5.5 CVE-2016-3492 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93650
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-3492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
https://linux.oracle.com/cve/CVE-2016-3492.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-client-5.5 CVE-2016-3521 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91932
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
https://linux.oracle.com/cve/CVE-2016-3521.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-client-5.5 CVE-2016-3615 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91960
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
https://linux.oracle.com/cve/CVE-2016-3615.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-client-5.5 CVE-2016-5440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91953
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-5440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
https://linux.oracle.com/cve/CVE-2016-5440.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-client-5.5 CVE-2016-5584 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93735
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3109-1
mysql-client-5.5 CVE-2016-5612 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93630
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612
https://linux.oracle.com/cve/CVE-2016-5612.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://security.gentoo.org/glsa/201701-01
mysql-client-5.5 CVE-2016-5624 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93635
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
https://linux.oracle.com/cve/CVE-2016-5624.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
mysql-client-5.5 CVE-2016-5626 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93638
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
https://linux.oracle.com/cve/CVE-2016-5626.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-client-5.5 CVE-2016-5629 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93668
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
https://linux.oracle.com/cve/CVE-2016-5629.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-client-5.5 CVE-2016-6662 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
http://rhn.redhat.com/errata/RHSA-2016-2058.html
http://rhn.redhat.com/errata/RHSA-2016-2059.html
http://rhn.redhat.com/errata/RHSA-2016-2060.html
http://rhn.redhat.com/errata/RHSA-2016-2061.html
http://rhn.redhat.com/errata/RHSA-2016-2062.html
http://rhn.redhat.com/errata/RHSA-2016-2077.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Sep/23
http://www.debian.org/security/2016/dsa-3666
http://www.openwall.com/lists/oss-security/2016/09/12/3
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92912
http://www.securitytracker.com/id/1036769
https://access.redhat.com/security/cve/CVE-2016-6662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
https://jira.mariadb.org/browse/MDEV-10465
https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt
https://linux.oracle.com/cve/CVE-2016-6662.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3078-1
https://www.exploit-db.com/exploits/40360/
https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
mysql-client-5.5 CVE-2016-6663 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.openwall.com/lists/oss-security/2016/10/25/4
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92911
http://www.securityfocus.com/bid/93614
https://access.redhat.com/security/cve/CVE-2016-6663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html
https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805
https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6663.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://www.exploit-db.com/exploits/40678/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
mysql-client-5.5 CVE-2016-6664 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.securityfocus.com/archive/1/539695/100/0/threaded
http://www.securityfocus.com/bid/93612
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2016-6664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6664.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6664
https://security.gentoo.org/glsa/201702-18
https://www.exploit-db.com/exploits/40679/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
mysql-client-5.5 CVE-2016-7440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93659
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-7440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://ubuntu.com/security/notices/USN-3109-1
https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
mysql-client-5.5 CVE-2016-8283 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93737
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-8283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
https://linux.oracle.com/cve/CVE-2016-8283.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-client-5.5 CVE-2017-10268 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101390
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
https://linux.oracle.com/cve/CVE-2017-10268.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2017-10378 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101375
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
https://linux.oracle.com/cve/CVE-2017-10378.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2017-10379 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101415
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
https://linux.oracle.com/cve/CVE-2017-10379.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
mysql-client-5.5 CVE-2017-10384 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101406
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
https://linux.oracle.com/cve/CVE-2017-10384.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
mysql-client-5.5 CVE-2017-3238 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95571
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
https://linux.oracle.com/cve/CVE-2017-3238.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-5.5 CVE-2017-3243 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95538
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
https://linux.oracle.com/cve/CVE-2017-3243.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-5.5 CVE-2017-3244 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95565
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
https://linux.oracle.com/cve/CVE-2017-3244.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-5.5 CVE-2017-3258 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95560
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
https://linux.oracle.com/cve/CVE-2017-3258.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-5.5 CVE-2017-3265 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95520
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
https://linux.oracle.com/cve/CVE-2017-3265.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-5.5 CVE-2017-3291 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95501
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
https://linux.oracle.com/cve/CVE-2017-3291.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-5.5 CVE-2017-3305 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://riddle.link/
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/03/17/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97023
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/security/cve/CVE-2017-3305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3308 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97725
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3308.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3309 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97742
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3309.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3312 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95491
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
https://linux.oracle.com/cve/CVE-2017-3312.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-5.5 CVE-2017-3313 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3809
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95527
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
https://linux.oracle.com/cve/CVE-2017-3313.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-5.5 CVE-2017-3317 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95585
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
https://linux.oracle.com/cve/CVE-2017-3317.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-5.5 CVE-2017-3318 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95588
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
https://linux.oracle.com/cve/CVE-2017-3318.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-5.5 CVE-2017-3329 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97763
http://www.securitytracker.com/id/1038287
https://access.redhat.com/security/cve/CVE-2017-3329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3453 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97776
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
https://linux.oracle.com/cve/CVE-2017-3453.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3456 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97831
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
https://linux.oracle.com/cve/CVE-2017-3456.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3461 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97812
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3462 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97851
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3463 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97849
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3464 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97818
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
https://linux.oracle.com/cve/CVE-2017-3464.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3600 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97765
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3600
https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/
https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
https://linux.oracle.com/cve/CVE-2017-3600.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3635 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99730
http://www.securitytracker.com/id/1038928
https://access.redhat.com/security/cve/CVE-2017-3635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3636 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99736
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
https://linux.oracle.com/cve/CVE-2017-3636.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-client-5.5 CVE-2017-3641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99767
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
https://linux.oracle.com/cve/CVE-2017-3641.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-client-5.5 CVE-2017-3648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99789
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3651 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99802
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
https://linux.oracle.com/cve/CVE-2017-3651.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3652 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99805
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-5.5 CVE-2017-3653 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99810
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
https://linux.oracle.com/cve/CVE-2017-3653.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-client-5.5 CVE-2018-2562 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102713
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
https://linux.oracle.com/cve/CVE-2018-2562.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-2622 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102706
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
https://linux.oracle.com/cve/CVE-2018-2622.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-2640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102678
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
https://linux.oracle.com/cve/CVE-2018-2640.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-2665 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102681
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
https://linux.oracle.com/cve/CVE-2018-2665.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-2668 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102682
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
https://linux.oracle.com/cve/CVE-2018-2668.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-2755 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103807
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
https://linux.oracle.com/cve/CVE-2018-2755.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-2761 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103820
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
https://linux.oracle.com/cve/CVE-2018-2761.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-2767 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/103954
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2018-2767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
https://linux.oracle.com/cve/CVE-2018-2767.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-2771 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103828
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
https://linux.oracle.com/cve/CVE-2018-2771.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-2773 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103811
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
mysql-client-5.5 CVE-2018-2781 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103825
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
https://linux.oracle.com/cve/CVE-2018-2781.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-2813 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103830
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
https://linux.oracle.com/cve/CVE-2018-2813.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-2817 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103818
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
https://linux.oracle.com/cve/CVE-2018-2817.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-2818 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103824
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
mysql-client-5.5 CVE-2018-2819 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103814
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
https://linux.oracle.com/cve/CVE-2018-2819.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-3058 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
https://linux.oracle.com/cve/CVE-2018-3058.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-3063 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104786
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
https://linux.oracle.com/cve/CVE-2018-3063.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-3066 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
https://linux.oracle.com/cve/CVE-2018-3066.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-3070 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-3070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
mysql-client-5.5 CVE-2018-3081 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104779
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
https://linux.oracle.com/cve/CVE-2018-3081.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-client-5.5 CVE-2018-3133 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-client-5.5 CVE-2018-3174 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105612
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-client-5.5 CVE-2018-3282 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
https://linux.oracle.com/cve/CVE-2018-3282.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-client-5.5 CVE-2017-3302 LOW 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3809
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/01/28/1
http://www.openwall.com/lists/oss-security/2017/02/11/11
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/96162
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
https://linux.oracle.com/cve/CVE-2017-3302.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2016-0640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86427
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
https://linux.oracle.com/cve/CVE-2016-0640.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-client-core-5.5 CVE-2016-0641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86470
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
https://linux.oracle.com/cve/CVE-2016-0641.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-client-core-5.5 CVE-2016-0642 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3557
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86445
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-client-core-5.5 CVE-2016-0643 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86486
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
https://linux.oracle.com/cve/CVE-2016-0643.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-client-core-5.5 CVE-2016-0644 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86442
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
https://linux.oracle.com/cve/CVE-2016-0644.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-client-core-5.5 CVE-2016-0646 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86436
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
https://linux.oracle.com/cve/CVE-2016-0646.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-client-core-5.5 CVE-2016-0647 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86495
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
https://linux.oracle.com/cve/CVE-2016-0647.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-client-core-5.5 CVE-2016-0648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86457
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
https://linux.oracle.com/cve/CVE-2016-0648.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-client-core-5.5 CVE-2016-0649 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86498
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
https://linux.oracle.com/cve/CVE-2016-0649.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-client-core-5.5 CVE-2016-0650 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86496
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
https://linux.oracle.com/cve/CVE-2016-0650.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-client-core-5.5 CVE-2016-0666 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86509
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
https://linux.oracle.com/cve/CVE-2016-0666.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-client-core-5.5 CVE-2016-2047 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://marc.info/?l=oss-security&m=145379584107459&w=2
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3453
http://www.debian.org/security/2016/dsa-3557
http://www.openwall.com/lists/oss-security/2016/01/26/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/81810
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-2047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41
https://linux.oracle.com/cve/CVE-2016-2047.html
https://linux.oracle.com/errata/ELSA-2016-0534.html
https://mariadb.atlassian.net/browse/MDEV-9212
https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
https://mariadb.com/kb/en/mdb-10023-rn/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-client-core-5.5 CVE-2016-3477 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91902
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
https://linux.oracle.com/cve/CVE-2016-3477.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-client-core-5.5 CVE-2016-3492 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93650
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-3492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
https://linux.oracle.com/cve/CVE-2016-3492.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-client-core-5.5 CVE-2016-3521 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91932
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
https://linux.oracle.com/cve/CVE-2016-3521.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-client-core-5.5 CVE-2016-3615 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91960
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
https://linux.oracle.com/cve/CVE-2016-3615.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-client-core-5.5 CVE-2016-5440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91953
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-5440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
https://linux.oracle.com/cve/CVE-2016-5440.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-client-core-5.5 CVE-2016-5584 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93735
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3109-1
mysql-client-core-5.5 CVE-2016-5612 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93630
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612
https://linux.oracle.com/cve/CVE-2016-5612.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://security.gentoo.org/glsa/201701-01
mysql-client-core-5.5 CVE-2016-5624 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93635
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
https://linux.oracle.com/cve/CVE-2016-5624.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
mysql-client-core-5.5 CVE-2016-5626 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93638
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
https://linux.oracle.com/cve/CVE-2016-5626.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-client-core-5.5 CVE-2016-5629 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93668
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
https://linux.oracle.com/cve/CVE-2016-5629.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-client-core-5.5 CVE-2016-6662 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
http://rhn.redhat.com/errata/RHSA-2016-2058.html
http://rhn.redhat.com/errata/RHSA-2016-2059.html
http://rhn.redhat.com/errata/RHSA-2016-2060.html
http://rhn.redhat.com/errata/RHSA-2016-2061.html
http://rhn.redhat.com/errata/RHSA-2016-2062.html
http://rhn.redhat.com/errata/RHSA-2016-2077.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Sep/23
http://www.debian.org/security/2016/dsa-3666
http://www.openwall.com/lists/oss-security/2016/09/12/3
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92912
http://www.securitytracker.com/id/1036769
https://access.redhat.com/security/cve/CVE-2016-6662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
https://jira.mariadb.org/browse/MDEV-10465
https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt
https://linux.oracle.com/cve/CVE-2016-6662.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3078-1
https://www.exploit-db.com/exploits/40360/
https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
mysql-client-core-5.5 CVE-2016-6663 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.openwall.com/lists/oss-security/2016/10/25/4
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92911
http://www.securityfocus.com/bid/93614
https://access.redhat.com/security/cve/CVE-2016-6663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html
https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805
https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6663.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://www.exploit-db.com/exploits/40678/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
mysql-client-core-5.5 CVE-2016-6664 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.securityfocus.com/archive/1/539695/100/0/threaded
http://www.securityfocus.com/bid/93612
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2016-6664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6664.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6664
https://security.gentoo.org/glsa/201702-18
https://www.exploit-db.com/exploits/40679/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
mysql-client-core-5.5 CVE-2016-7440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93659
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-7440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://ubuntu.com/security/notices/USN-3109-1
https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
mysql-client-core-5.5 CVE-2016-8283 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93737
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-8283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
https://linux.oracle.com/cve/CVE-2016-8283.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-client-core-5.5 CVE-2017-10268 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101390
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
https://linux.oracle.com/cve/CVE-2017-10268.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2017-10378 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101375
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
https://linux.oracle.com/cve/CVE-2017-10378.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2017-10379 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101415
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
https://linux.oracle.com/cve/CVE-2017-10379.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
mysql-client-core-5.5 CVE-2017-10384 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101406
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
https://linux.oracle.com/cve/CVE-2017-10384.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
mysql-client-core-5.5 CVE-2017-3238 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95571
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
https://linux.oracle.com/cve/CVE-2017-3238.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-core-5.5 CVE-2017-3243 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95538
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
https://linux.oracle.com/cve/CVE-2017-3243.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-core-5.5 CVE-2017-3244 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95565
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
https://linux.oracle.com/cve/CVE-2017-3244.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-core-5.5 CVE-2017-3258 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95560
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
https://linux.oracle.com/cve/CVE-2017-3258.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-core-5.5 CVE-2017-3265 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95520
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
https://linux.oracle.com/cve/CVE-2017-3265.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-core-5.5 CVE-2017-3291 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95501
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
https://linux.oracle.com/cve/CVE-2017-3291.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-core-5.5 CVE-2017-3305 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://riddle.link/
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/03/17/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97023
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/security/cve/CVE-2017-3305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3308 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97725
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3308.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3309 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97742
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3309.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3312 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95491
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
https://linux.oracle.com/cve/CVE-2017-3312.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-core-5.5 CVE-2017-3313 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3809
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95527
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
https://linux.oracle.com/cve/CVE-2017-3313.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-core-5.5 CVE-2017-3317 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95585
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
https://linux.oracle.com/cve/CVE-2017-3317.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-core-5.5 CVE-2017-3318 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95588
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
https://linux.oracle.com/cve/CVE-2017-3318.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-client-core-5.5 CVE-2017-3329 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97763
http://www.securitytracker.com/id/1038287
https://access.redhat.com/security/cve/CVE-2017-3329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3453 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97776
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
https://linux.oracle.com/cve/CVE-2017-3453.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3456 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97831
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
https://linux.oracle.com/cve/CVE-2017-3456.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3461 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97812
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3462 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97851
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3463 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97849
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3464 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97818
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
https://linux.oracle.com/cve/CVE-2017-3464.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3600 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97765
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3600
https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/
https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
https://linux.oracle.com/cve/CVE-2017-3600.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3635 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99730
http://www.securitytracker.com/id/1038928
https://access.redhat.com/security/cve/CVE-2017-3635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3636 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99736
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
https://linux.oracle.com/cve/CVE-2017-3636.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-client-core-5.5 CVE-2017-3641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99767
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
https://linux.oracle.com/cve/CVE-2017-3641.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-client-core-5.5 CVE-2017-3648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99789
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3651 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99802
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
https://linux.oracle.com/cve/CVE-2017-3651.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3652 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99805
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-client-core-5.5 CVE-2017-3653 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99810
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
https://linux.oracle.com/cve/CVE-2017-3653.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-client-core-5.5 CVE-2018-2562 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102713
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
https://linux.oracle.com/cve/CVE-2018-2562.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-2622 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102706
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
https://linux.oracle.com/cve/CVE-2018-2622.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-2640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102678
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
https://linux.oracle.com/cve/CVE-2018-2640.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-2665 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102681
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
https://linux.oracle.com/cve/CVE-2018-2665.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-2668 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102682
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
https://linux.oracle.com/cve/CVE-2018-2668.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-2755 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103807
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
https://linux.oracle.com/cve/CVE-2018-2755.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-2761 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103820
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
https://linux.oracle.com/cve/CVE-2018-2761.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-2767 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/103954
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2018-2767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
https://linux.oracle.com/cve/CVE-2018-2767.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-2771 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103828
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
https://linux.oracle.com/cve/CVE-2018-2771.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-2773 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103811
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
mysql-client-core-5.5 CVE-2018-2781 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103825
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
https://linux.oracle.com/cve/CVE-2018-2781.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-2813 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103830
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
https://linux.oracle.com/cve/CVE-2018-2813.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-2817 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103818
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
https://linux.oracle.com/cve/CVE-2018-2817.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-2818 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103824
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
mysql-client-core-5.5 CVE-2018-2819 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103814
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
https://linux.oracle.com/cve/CVE-2018-2819.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-3058 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
https://linux.oracle.com/cve/CVE-2018-3058.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-3063 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104786
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
https://linux.oracle.com/cve/CVE-2018-3063.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-3066 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
https://linux.oracle.com/cve/CVE-2018-3066.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-3070 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-3070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
mysql-client-core-5.5 CVE-2018-3081 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104779
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
https://linux.oracle.com/cve/CVE-2018-3081.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-client-core-5.5 CVE-2018-3133 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-client-core-5.5 CVE-2018-3174 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105612
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-client-core-5.5 CVE-2018-3282 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
https://linux.oracle.com/cve/CVE-2018-3282.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-client-core-5.5 CVE-2017-3302 LOW 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3809
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/01/28/1
http://www.openwall.com/lists/oss-security/2017/02/11/11
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/96162
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
https://linux.oracle.com/cve/CVE-2017-3302.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2016-0640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86427
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
https://linux.oracle.com/cve/CVE-2016-0640.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-common CVE-2016-0641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86470
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
https://linux.oracle.com/cve/CVE-2016-0641.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-common CVE-2016-0642 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3557
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86445
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-common CVE-2016-0643 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86486
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
https://linux.oracle.com/cve/CVE-2016-0643.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-common CVE-2016-0644 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86442
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
https://linux.oracle.com/cve/CVE-2016-0644.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-common CVE-2016-0646 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86436
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
https://linux.oracle.com/cve/CVE-2016-0646.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-common CVE-2016-0647 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86495
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
https://linux.oracle.com/cve/CVE-2016-0647.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-common CVE-2016-0648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86457
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
https://linux.oracle.com/cve/CVE-2016-0648.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-common CVE-2016-0649 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86498
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
https://linux.oracle.com/cve/CVE-2016-0649.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-common CVE-2016-0650 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86496
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
https://linux.oracle.com/cve/CVE-2016-0650.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-common CVE-2016-0666 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86509
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
https://linux.oracle.com/cve/CVE-2016-0666.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-common CVE-2016-2047 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://marc.info/?l=oss-security&m=145379584107459&w=2
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3453
http://www.debian.org/security/2016/dsa-3557
http://www.openwall.com/lists/oss-security/2016/01/26/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/81810
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-2047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41
https://linux.oracle.com/cve/CVE-2016-2047.html
https://linux.oracle.com/errata/ELSA-2016-0534.html
https://mariadb.atlassian.net/browse/MDEV-9212
https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
https://mariadb.com/kb/en/mdb-10023-rn/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-common CVE-2016-3477 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91902
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
https://linux.oracle.com/cve/CVE-2016-3477.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-common CVE-2016-3492 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93650
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-3492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
https://linux.oracle.com/cve/CVE-2016-3492.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-common CVE-2016-3521 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91932
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
https://linux.oracle.com/cve/CVE-2016-3521.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-common CVE-2016-3615 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91960
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
https://linux.oracle.com/cve/CVE-2016-3615.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-common CVE-2016-5440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91953
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-5440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
https://linux.oracle.com/cve/CVE-2016-5440.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-common CVE-2016-5584 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93735
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3109-1
mysql-common CVE-2016-5612 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93630
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612
https://linux.oracle.com/cve/CVE-2016-5612.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://security.gentoo.org/glsa/201701-01
mysql-common CVE-2016-5624 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93635
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
https://linux.oracle.com/cve/CVE-2016-5624.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
mysql-common CVE-2016-5626 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93638
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
https://linux.oracle.com/cve/CVE-2016-5626.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-common CVE-2016-5629 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93668
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
https://linux.oracle.com/cve/CVE-2016-5629.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-common CVE-2016-6662 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
http://rhn.redhat.com/errata/RHSA-2016-2058.html
http://rhn.redhat.com/errata/RHSA-2016-2059.html
http://rhn.redhat.com/errata/RHSA-2016-2060.html
http://rhn.redhat.com/errata/RHSA-2016-2061.html
http://rhn.redhat.com/errata/RHSA-2016-2062.html
http://rhn.redhat.com/errata/RHSA-2016-2077.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Sep/23
http://www.debian.org/security/2016/dsa-3666
http://www.openwall.com/lists/oss-security/2016/09/12/3
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92912
http://www.securitytracker.com/id/1036769
https://access.redhat.com/security/cve/CVE-2016-6662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
https://jira.mariadb.org/browse/MDEV-10465
https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt
https://linux.oracle.com/cve/CVE-2016-6662.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3078-1
https://www.exploit-db.com/exploits/40360/
https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
mysql-common CVE-2016-6663 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.openwall.com/lists/oss-security/2016/10/25/4
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92911
http://www.securityfocus.com/bid/93614
https://access.redhat.com/security/cve/CVE-2016-6663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html
https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805
https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6663.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://www.exploit-db.com/exploits/40678/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
mysql-common CVE-2016-6664 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.securityfocus.com/archive/1/539695/100/0/threaded
http://www.securityfocus.com/bid/93612
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2016-6664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6664.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6664
https://security.gentoo.org/glsa/201702-18
https://www.exploit-db.com/exploits/40679/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
mysql-common CVE-2016-7440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93659
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-7440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://ubuntu.com/security/notices/USN-3109-1
https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
mysql-common CVE-2016-8283 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93737
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-8283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
https://linux.oracle.com/cve/CVE-2016-8283.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-common CVE-2017-10268 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101390
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
https://linux.oracle.com/cve/CVE-2017-10268.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2017-10378 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101375
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
https://linux.oracle.com/cve/CVE-2017-10378.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2017-10379 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101415
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
https://linux.oracle.com/cve/CVE-2017-10379.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
mysql-common CVE-2017-10384 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101406
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
https://linux.oracle.com/cve/CVE-2017-10384.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
mysql-common CVE-2017-3238 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95571
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
https://linux.oracle.com/cve/CVE-2017-3238.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-common CVE-2017-3243 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95538
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
https://linux.oracle.com/cve/CVE-2017-3243.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-common CVE-2017-3244 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95565
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
https://linux.oracle.com/cve/CVE-2017-3244.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-common CVE-2017-3258 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95560
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
https://linux.oracle.com/cve/CVE-2017-3258.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-common CVE-2017-3265 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95520
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
https://linux.oracle.com/cve/CVE-2017-3265.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-common CVE-2017-3291 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95501
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
https://linux.oracle.com/cve/CVE-2017-3291.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-common CVE-2017-3305 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://riddle.link/
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/03/17/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97023
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/security/cve/CVE-2017-3305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3308 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97725
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3308.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3309 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97742
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3309.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3312 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95491
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
https://linux.oracle.com/cve/CVE-2017-3312.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-common CVE-2017-3313 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3809
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95527
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
https://linux.oracle.com/cve/CVE-2017-3313.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://ubuntu.com/security/notices/USN-3174-1
mysql-common CVE-2017-3317 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95585
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
https://linux.oracle.com/cve/CVE-2017-3317.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-common CVE-2017-3318 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95588
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
https://linux.oracle.com/cve/CVE-2017-3318.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-common CVE-2017-3329 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97763
http://www.securitytracker.com/id/1038287
https://access.redhat.com/security/cve/CVE-2017-3329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3453 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97776
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
https://linux.oracle.com/cve/CVE-2017-3453.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3456 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97831
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
https://linux.oracle.com/cve/CVE-2017-3456.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3461 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97812
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3462 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97851
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3463 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97849
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3464 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97818
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
https://linux.oracle.com/cve/CVE-2017-3464.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3600 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97765
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3600
https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/
https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
https://linux.oracle.com/cve/CVE-2017-3600.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3635 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99730
http://www.securitytracker.com/id/1038928
https://access.redhat.com/security/cve/CVE-2017-3635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3636 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99736
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
https://linux.oracle.com/cve/CVE-2017-3636.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-common CVE-2017-3641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99767
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
https://linux.oracle.com/cve/CVE-2017-3641.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-common CVE-2017-3648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99789
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3651 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99802
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
https://linux.oracle.com/cve/CVE-2017-3651.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3652 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99805
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-common CVE-2017-3653 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99810
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
https://linux.oracle.com/cve/CVE-2017-3653.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-common CVE-2018-2562 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102713
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
https://linux.oracle.com/cve/CVE-2018-2562.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-2622 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102706
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
https://linux.oracle.com/cve/CVE-2018-2622.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-2640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102678
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
https://linux.oracle.com/cve/CVE-2018-2640.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-2665 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102681
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
https://linux.oracle.com/cve/CVE-2018-2665.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-2668 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102682
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
https://linux.oracle.com/cve/CVE-2018-2668.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-2755 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103807
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
https://linux.oracle.com/cve/CVE-2018-2755.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-2761 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103820
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
https://linux.oracle.com/cve/CVE-2018-2761.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-2767 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/103954
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2018-2767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
https://linux.oracle.com/cve/CVE-2018-2767.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-2771 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103828
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
https://linux.oracle.com/cve/CVE-2018-2771.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-2773 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103811
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
mysql-common CVE-2018-2781 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103825
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
https://linux.oracle.com/cve/CVE-2018-2781.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-2813 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103830
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
https://linux.oracle.com/cve/CVE-2018-2813.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-2817 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103818
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
https://linux.oracle.com/cve/CVE-2018-2817.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-2818 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103824
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
mysql-common CVE-2018-2819 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103814
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
https://linux.oracle.com/cve/CVE-2018-2819.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-3058 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
https://linux.oracle.com/cve/CVE-2018-3058.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-3063 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104786
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
https://linux.oracle.com/cve/CVE-2018-3063.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-3066 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
https://linux.oracle.com/cve/CVE-2018-3066.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-3070 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-3070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
mysql-common CVE-2018-3081 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104779
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
https://linux.oracle.com/cve/CVE-2018-3081.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-common CVE-2018-3133 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-common CVE-2018-3174 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105612
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-common CVE-2018-3282 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
https://linux.oracle.com/cve/CVE-2018-3282.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-common CVE-2017-3302 LOW 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3809
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/01/28/1
http://www.openwall.com/lists/oss-security/2017/02/11/11
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/96162
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
https://linux.oracle.com/cve/CVE-2017-3302.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2016-0640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86427
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
https://linux.oracle.com/cve/CVE-2016-0640.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server CVE-2016-0641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86470
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
https://linux.oracle.com/cve/CVE-2016-0641.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server CVE-2016-0642 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3557
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86445
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server CVE-2016-0643 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86486
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
https://linux.oracle.com/cve/CVE-2016-0643.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server CVE-2016-0644 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86442
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
https://linux.oracle.com/cve/CVE-2016-0644.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server CVE-2016-0646 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86436
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
https://linux.oracle.com/cve/CVE-2016-0646.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server CVE-2016-0647 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86495
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
https://linux.oracle.com/cve/CVE-2016-0647.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server CVE-2016-0648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86457
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
https://linux.oracle.com/cve/CVE-2016-0648.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server CVE-2016-0649 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86498
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
https://linux.oracle.com/cve/CVE-2016-0649.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server CVE-2016-0650 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86496
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
https://linux.oracle.com/cve/CVE-2016-0650.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server CVE-2016-0666 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86509
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
https://linux.oracle.com/cve/CVE-2016-0666.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server CVE-2016-2047 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://marc.info/?l=oss-security&m=145379584107459&w=2
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3453
http://www.debian.org/security/2016/dsa-3557
http://www.openwall.com/lists/oss-security/2016/01/26/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/81810
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-2047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41
https://linux.oracle.com/cve/CVE-2016-2047.html
https://linux.oracle.com/errata/ELSA-2016-0534.html
https://mariadb.atlassian.net/browse/MDEV-9212
https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
https://mariadb.com/kb/en/mdb-10023-rn/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server CVE-2016-3477 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91902
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
https://linux.oracle.com/cve/CVE-2016-3477.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-server CVE-2016-3492 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93650
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-3492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
https://linux.oracle.com/cve/CVE-2016-3492.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-server CVE-2016-3521 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91932
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
https://linux.oracle.com/cve/CVE-2016-3521.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-server CVE-2016-3615 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91960
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
https://linux.oracle.com/cve/CVE-2016-3615.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-server CVE-2016-5440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91953
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-5440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
https://linux.oracle.com/cve/CVE-2016-5440.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-server CVE-2016-5584 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93735
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3109-1
mysql-server CVE-2016-5612 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93630
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612
https://linux.oracle.com/cve/CVE-2016-5612.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://security.gentoo.org/glsa/201701-01
mysql-server CVE-2016-5624 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93635
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
https://linux.oracle.com/cve/CVE-2016-5624.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
mysql-server CVE-2016-5626 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93638
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
https://linux.oracle.com/cve/CVE-2016-5626.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-server CVE-2016-5629 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93668
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
https://linux.oracle.com/cve/CVE-2016-5629.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-server CVE-2016-6662 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
http://rhn.redhat.com/errata/RHSA-2016-2058.html
http://rhn.redhat.com/errata/RHSA-2016-2059.html
http://rhn.redhat.com/errata/RHSA-2016-2060.html
http://rhn.redhat.com/errata/RHSA-2016-2061.html
http://rhn.redhat.com/errata/RHSA-2016-2062.html
http://rhn.redhat.com/errata/RHSA-2016-2077.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Sep/23
http://www.debian.org/security/2016/dsa-3666
http://www.openwall.com/lists/oss-security/2016/09/12/3
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92912
http://www.securitytracker.com/id/1036769
https://access.redhat.com/security/cve/CVE-2016-6662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
https://jira.mariadb.org/browse/MDEV-10465
https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt
https://linux.oracle.com/cve/CVE-2016-6662.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3078-1
https://www.exploit-db.com/exploits/40360/
https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
mysql-server CVE-2016-6663 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.openwall.com/lists/oss-security/2016/10/25/4
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92911
http://www.securityfocus.com/bid/93614
https://access.redhat.com/security/cve/CVE-2016-6663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html
https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805
https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6663.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://www.exploit-db.com/exploits/40678/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
mysql-server CVE-2016-6664 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.securityfocus.com/archive/1/539695/100/0/threaded
http://www.securityfocus.com/bid/93612
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2016-6664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6664.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6664
https://security.gentoo.org/glsa/201702-18
https://www.exploit-db.com/exploits/40679/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
mysql-server CVE-2016-7440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93659
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-7440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://ubuntu.com/security/notices/USN-3109-1
https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
mysql-server CVE-2016-8283 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93737
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-8283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
https://linux.oracle.com/cve/CVE-2016-8283.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-server CVE-2017-10268 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101390
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
https://linux.oracle.com/cve/CVE-2017-10268.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2017-10378 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101375
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
https://linux.oracle.com/cve/CVE-2017-10378.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2017-10379 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101415
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
https://linux.oracle.com/cve/CVE-2017-10379.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
mysql-server CVE-2017-10384 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101406
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
https://linux.oracle.com/cve/CVE-2017-10384.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
mysql-server CVE-2017-3238 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95571
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
https://linux.oracle.com/cve/CVE-2017-3238.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server CVE-2017-3243 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95538
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
https://linux.oracle.com/cve/CVE-2017-3243.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server CVE-2017-3244 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95565
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
https://linux.oracle.com/cve/CVE-2017-3244.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server CVE-2017-3258 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95560
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
https://linux.oracle.com/cve/CVE-2017-3258.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server CVE-2017-3265 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95520
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
https://linux.oracle.com/cve/CVE-2017-3265.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server CVE-2017-3291 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95501
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
https://linux.oracle.com/cve/CVE-2017-3291.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server CVE-2017-3305 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://riddle.link/
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/03/17/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97023
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/security/cve/CVE-2017-3305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3308 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97725
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3308.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3309 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97742
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3309.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3312 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95491
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
https://linux.oracle.com/cve/CVE-2017-3312.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server CVE-2017-3313 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3809
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95527
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
https://linux.oracle.com/cve/CVE-2017-3313.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://ubuntu.com/security/notices/USN-3174-1
mysql-server CVE-2017-3317 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95585
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
https://linux.oracle.com/cve/CVE-2017-3317.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server CVE-2017-3318 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95588
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
https://linux.oracle.com/cve/CVE-2017-3318.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server CVE-2017-3329 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97763
http://www.securitytracker.com/id/1038287
https://access.redhat.com/security/cve/CVE-2017-3329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3453 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97776
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
https://linux.oracle.com/cve/CVE-2017-3453.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3456 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97831
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
https://linux.oracle.com/cve/CVE-2017-3456.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3461 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97812
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3462 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97851
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3463 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97849
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3464 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97818
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
https://linux.oracle.com/cve/CVE-2017-3464.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3600 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97765
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3600
https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/
https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
https://linux.oracle.com/cve/CVE-2017-3600.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3635 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99730
http://www.securitytracker.com/id/1038928
https://access.redhat.com/security/cve/CVE-2017-3635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3636 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99736
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
https://linux.oracle.com/cve/CVE-2017-3636.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-server CVE-2017-3641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99767
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
https://linux.oracle.com/cve/CVE-2017-3641.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-server CVE-2017-3648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99789
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3651 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99802
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
https://linux.oracle.com/cve/CVE-2017-3651.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3652 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99805
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server CVE-2017-3653 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99810
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
https://linux.oracle.com/cve/CVE-2017-3653.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-server CVE-2018-2562 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102713
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
https://linux.oracle.com/cve/CVE-2018-2562.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-2622 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102706
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
https://linux.oracle.com/cve/CVE-2018-2622.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-2640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102678
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
https://linux.oracle.com/cve/CVE-2018-2640.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-2665 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102681
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
https://linux.oracle.com/cve/CVE-2018-2665.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-2668 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102682
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
https://linux.oracle.com/cve/CVE-2018-2668.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-2755 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103807
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
https://linux.oracle.com/cve/CVE-2018-2755.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-2761 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103820
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
https://linux.oracle.com/cve/CVE-2018-2761.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-2767 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/103954
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2018-2767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
https://linux.oracle.com/cve/CVE-2018-2767.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-2771 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103828
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
https://linux.oracle.com/cve/CVE-2018-2771.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-2773 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103811
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
mysql-server CVE-2018-2781 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103825
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
https://linux.oracle.com/cve/CVE-2018-2781.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-2813 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103830
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
https://linux.oracle.com/cve/CVE-2018-2813.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-2817 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103818
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
https://linux.oracle.com/cve/CVE-2018-2817.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-2818 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103824
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
mysql-server CVE-2018-2819 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103814
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
https://linux.oracle.com/cve/CVE-2018-2819.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-3058 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
https://linux.oracle.com/cve/CVE-2018-3058.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-3063 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104786
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
https://linux.oracle.com/cve/CVE-2018-3063.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-3066 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
https://linux.oracle.com/cve/CVE-2018-3066.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-3070 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-3070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
mysql-server CVE-2018-3081 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104779
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
https://linux.oracle.com/cve/CVE-2018-3081.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server CVE-2018-3133 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-server CVE-2018-3174 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105612
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-server CVE-2018-3282 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
https://linux.oracle.com/cve/CVE-2018-3282.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-server CVE-2017-3302 LOW 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3809
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/01/28/1
http://www.openwall.com/lists/oss-security/2017/02/11/11
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/96162
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
https://linux.oracle.com/cve/CVE-2017-3302.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2016-0640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86427
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
https://linux.oracle.com/cve/CVE-2016-0640.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server-5.5 CVE-2016-0641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86470
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
https://linux.oracle.com/cve/CVE-2016-0641.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server-5.5 CVE-2016-0642 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3557
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86445
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server-5.5 CVE-2016-0643 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86486
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
https://linux.oracle.com/cve/CVE-2016-0643.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server-5.5 CVE-2016-0644 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86442
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
https://linux.oracle.com/cve/CVE-2016-0644.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server-5.5 CVE-2016-0646 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86436
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
https://linux.oracle.com/cve/CVE-2016-0646.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server-5.5 CVE-2016-0647 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86495
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
https://linux.oracle.com/cve/CVE-2016-0647.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server-5.5 CVE-2016-0648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86457
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
https://linux.oracle.com/cve/CVE-2016-0648.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server-5.5 CVE-2016-0649 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86498
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
https://linux.oracle.com/cve/CVE-2016-0649.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server-5.5 CVE-2016-0650 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86496
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
https://linux.oracle.com/cve/CVE-2016-0650.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server-5.5 CVE-2016-0666 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86509
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
https://linux.oracle.com/cve/CVE-2016-0666.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server-5.5 CVE-2016-2047 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://marc.info/?l=oss-security&m=145379584107459&w=2
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3453
http://www.debian.org/security/2016/dsa-3557
http://www.openwall.com/lists/oss-security/2016/01/26/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/81810
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-2047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41
https://linux.oracle.com/cve/CVE-2016-2047.html
https://linux.oracle.com/errata/ELSA-2016-0534.html
https://mariadb.atlassian.net/browse/MDEV-9212
https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
https://mariadb.com/kb/en/mdb-10023-rn/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server-5.5 CVE-2016-3477 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91902
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
https://linux.oracle.com/cve/CVE-2016-3477.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-server-5.5 CVE-2016-3492 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93650
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-3492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
https://linux.oracle.com/cve/CVE-2016-3492.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-server-5.5 CVE-2016-3521 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91932
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
https://linux.oracle.com/cve/CVE-2016-3521.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-server-5.5 CVE-2016-3615 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91960
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
https://linux.oracle.com/cve/CVE-2016-3615.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-server-5.5 CVE-2016-5440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91953
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-5440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
https://linux.oracle.com/cve/CVE-2016-5440.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-server-5.5 CVE-2016-5584 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93735
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3109-1
mysql-server-5.5 CVE-2016-5612 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93630
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612
https://linux.oracle.com/cve/CVE-2016-5612.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://security.gentoo.org/glsa/201701-01
mysql-server-5.5 CVE-2016-5624 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93635
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
https://linux.oracle.com/cve/CVE-2016-5624.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
mysql-server-5.5 CVE-2016-5626 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93638
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
https://linux.oracle.com/cve/CVE-2016-5626.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-server-5.5 CVE-2016-5629 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93668
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
https://linux.oracle.com/cve/CVE-2016-5629.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-server-5.5 CVE-2016-6662 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
http://rhn.redhat.com/errata/RHSA-2016-2058.html
http://rhn.redhat.com/errata/RHSA-2016-2059.html
http://rhn.redhat.com/errata/RHSA-2016-2060.html
http://rhn.redhat.com/errata/RHSA-2016-2061.html
http://rhn.redhat.com/errata/RHSA-2016-2062.html
http://rhn.redhat.com/errata/RHSA-2016-2077.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Sep/23
http://www.debian.org/security/2016/dsa-3666
http://www.openwall.com/lists/oss-security/2016/09/12/3
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92912
http://www.securitytracker.com/id/1036769
https://access.redhat.com/security/cve/CVE-2016-6662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
https://jira.mariadb.org/browse/MDEV-10465
https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt
https://linux.oracle.com/cve/CVE-2016-6662.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3078-1
https://www.exploit-db.com/exploits/40360/
https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
mysql-server-5.5 CVE-2016-6663 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.openwall.com/lists/oss-security/2016/10/25/4
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92911
http://www.securityfocus.com/bid/93614
https://access.redhat.com/security/cve/CVE-2016-6663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html
https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805
https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6663.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://www.exploit-db.com/exploits/40678/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
mysql-server-5.5 CVE-2016-6664 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.securityfocus.com/archive/1/539695/100/0/threaded
http://www.securityfocus.com/bid/93612
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2016-6664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6664.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6664
https://security.gentoo.org/glsa/201702-18
https://www.exploit-db.com/exploits/40679/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
mysql-server-5.5 CVE-2016-7440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93659
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-7440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://ubuntu.com/security/notices/USN-3109-1
https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
mysql-server-5.5 CVE-2016-8283 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93737
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-8283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
https://linux.oracle.com/cve/CVE-2016-8283.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-server-5.5 CVE-2017-10268 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101390
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
https://linux.oracle.com/cve/CVE-2017-10268.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2017-10378 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101375
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
https://linux.oracle.com/cve/CVE-2017-10378.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2017-10379 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101415
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
https://linux.oracle.com/cve/CVE-2017-10379.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
mysql-server-5.5 CVE-2017-10384 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101406
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
https://linux.oracle.com/cve/CVE-2017-10384.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
mysql-server-5.5 CVE-2017-3238 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95571
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
https://linux.oracle.com/cve/CVE-2017-3238.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-5.5 CVE-2017-3243 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95538
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
https://linux.oracle.com/cve/CVE-2017-3243.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-5.5 CVE-2017-3244 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95565
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
https://linux.oracle.com/cve/CVE-2017-3244.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-5.5 CVE-2017-3258 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95560
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
https://linux.oracle.com/cve/CVE-2017-3258.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-5.5 CVE-2017-3265 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95520
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
https://linux.oracle.com/cve/CVE-2017-3265.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-5.5 CVE-2017-3291 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95501
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
https://linux.oracle.com/cve/CVE-2017-3291.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-5.5 CVE-2017-3305 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://riddle.link/
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/03/17/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97023
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/security/cve/CVE-2017-3305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3308 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97725
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3308.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3309 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97742
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3309.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3312 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95491
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
https://linux.oracle.com/cve/CVE-2017-3312.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-5.5 CVE-2017-3313 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3809
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95527
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
https://linux.oracle.com/cve/CVE-2017-3313.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-5.5 CVE-2017-3317 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95585
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
https://linux.oracle.com/cve/CVE-2017-3317.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-5.5 CVE-2017-3318 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95588
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
https://linux.oracle.com/cve/CVE-2017-3318.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-5.5 CVE-2017-3329 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97763
http://www.securitytracker.com/id/1038287
https://access.redhat.com/security/cve/CVE-2017-3329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3453 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97776
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
https://linux.oracle.com/cve/CVE-2017-3453.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3456 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97831
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
https://linux.oracle.com/cve/CVE-2017-3456.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3461 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97812
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3462 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97851
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3463 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97849
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3464 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97818
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
https://linux.oracle.com/cve/CVE-2017-3464.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3600 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97765
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3600
https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/
https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
https://linux.oracle.com/cve/CVE-2017-3600.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3635 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99730
http://www.securitytracker.com/id/1038928
https://access.redhat.com/security/cve/CVE-2017-3635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3636 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99736
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
https://linux.oracle.com/cve/CVE-2017-3636.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-server-5.5 CVE-2017-3641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99767
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
https://linux.oracle.com/cve/CVE-2017-3641.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-server-5.5 CVE-2017-3648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99789
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3651 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99802
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
https://linux.oracle.com/cve/CVE-2017-3651.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3652 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99805
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-5.5 CVE-2017-3653 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99810
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
https://linux.oracle.com/cve/CVE-2017-3653.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-server-5.5 CVE-2018-2562 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102713
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
https://linux.oracle.com/cve/CVE-2018-2562.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-2622 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102706
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
https://linux.oracle.com/cve/CVE-2018-2622.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-2640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102678
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
https://linux.oracle.com/cve/CVE-2018-2640.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-2665 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102681
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
https://linux.oracle.com/cve/CVE-2018-2665.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-2668 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102682
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
https://linux.oracle.com/cve/CVE-2018-2668.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-2755 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103807
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
https://linux.oracle.com/cve/CVE-2018-2755.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-2761 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103820
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
https://linux.oracle.com/cve/CVE-2018-2761.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-2767 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/103954
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2018-2767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
https://linux.oracle.com/cve/CVE-2018-2767.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-2771 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103828
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
https://linux.oracle.com/cve/CVE-2018-2771.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-2773 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103811
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
mysql-server-5.5 CVE-2018-2781 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103825
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
https://linux.oracle.com/cve/CVE-2018-2781.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-2813 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103830
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
https://linux.oracle.com/cve/CVE-2018-2813.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-2817 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103818
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
https://linux.oracle.com/cve/CVE-2018-2817.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-2818 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103824
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
mysql-server-5.5 CVE-2018-2819 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103814
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
https://linux.oracle.com/cve/CVE-2018-2819.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-3058 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
https://linux.oracle.com/cve/CVE-2018-3058.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-3063 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104786
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
https://linux.oracle.com/cve/CVE-2018-3063.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-3066 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
https://linux.oracle.com/cve/CVE-2018-3066.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-3070 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-3070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
mysql-server-5.5 CVE-2018-3081 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104779
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
https://linux.oracle.com/cve/CVE-2018-3081.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server-5.5 CVE-2018-3133 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-server-5.5 CVE-2018-3174 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105612
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-server-5.5 CVE-2018-3282 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
https://linux.oracle.com/cve/CVE-2018-3282.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-server-5.5 CVE-2017-3302 LOW 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3809
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/01/28/1
http://www.openwall.com/lists/oss-security/2017/02/11/11
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/96162
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
https://linux.oracle.com/cve/CVE-2017-3302.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2016-0640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86427
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
https://linux.oracle.com/cve/CVE-2016-0640.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server-core-5.5 CVE-2016-0641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86470
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
https://linux.oracle.com/cve/CVE-2016-0641.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server-core-5.5 CVE-2016-0642 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3557
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86445
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server-core-5.5 CVE-2016-0643 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.securityfocus.com/bid/86486
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
https://linux.oracle.com/cve/CVE-2016-0643.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server-core-5.5 CVE-2016-0644 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86442
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
https://linux.oracle.com/cve/CVE-2016-0644.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server-core-5.5 CVE-2016-0646 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86436
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
https://linux.oracle.com/cve/CVE-2016-0646.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server-core-5.5 CVE-2016-0647 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86495
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
https://linux.oracle.com/cve/CVE-2016-0647.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server-core-5.5 CVE-2016-0648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86457
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
https://linux.oracle.com/cve/CVE-2016-0648.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server-core-5.5 CVE-2016-0649 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86498
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
https://linux.oracle.com/cve/CVE-2016-0649.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server-core-5.5 CVE-2016-0650 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86496
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
https://linux.oracle.com/cve/CVE-2016-0650.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
mysql-server-core-5.5 CVE-2016-0666 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3557
http://www.debian.org/security/2016/dsa-3595
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/86509
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-0666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
https://linux.oracle.com/cve/CVE-2016-0666.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server-core-5.5 CVE-2016-2047 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.49-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
http://marc.info/?l=oss-security&m=145379584107459&w=2
http://rhn.redhat.com/errata/RHSA-2016-0534.html
http://rhn.redhat.com/errata/RHSA-2016-0705.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1481.html
http://www.debian.org/security/2016/dsa-3453
http://www.debian.org/security/2016/dsa-3557
http://www.openwall.com/lists/oss-security/2016/01/26/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/81810
http://www.securitytracker.com/id/1035606
http://www.ubuntu.com/usn/USN-2953-1
http://www.ubuntu.com/usn/USN-2954-1
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-2047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41
https://linux.oracle.com/cve/CVE-2016-2047.html
https://linux.oracle.com/errata/ELSA-2016-0534.html
https://mariadb.atlassian.net/browse/MDEV-9212
https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
https://mariadb.com/kb/en/mdb-10023-rn/
https://ubuntu.com/security/notices/USN-2953-1
https://ubuntu.com/security/notices/USN-2954-1
mysql-server-core-5.5 CVE-2016-3477 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91902
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
https://linux.oracle.com/cve/CVE-2016-3477.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-server-core-5.5 CVE-2016-3492 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93650
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-3492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
https://linux.oracle.com/cve/CVE-2016-3492.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-server-core-5.5 CVE-2016-3521 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91932
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
https://linux.oracle.com/cve/CVE-2016-3521.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-server-core-5.5 CVE-2016-3615 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91960
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-3615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
https://linux.oracle.com/cve/CVE-2016-3615.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-server-core-5.5 CVE-2016-5440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.50-0ubuntu0.14.04.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-1480.html
http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-1602.html
http://rhn.redhat.com/errata/RHSA-2016-1603.html
http://rhn.redhat.com/errata/RHSA-2016-1604.html
http://rhn.redhat.com/errata/RHSA-2016-1637.html
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
http://www.debian.org/security/2016/dsa-3624
http://www.debian.org/security/2016/dsa-3632
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91953
http://www.securitytracker.com/id/1036362
http://www.ubuntu.com/usn/USN-3040-1
https://access.redhat.com/security/cve/CVE-2016-5440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
https://linux.oracle.com/cve/CVE-2016-5440.html
https://linux.oracle.com/errata/ELSA-2016-1602.html
https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
https://ubuntu.com/security/notices/USN-3040-1
mysql-server-core-5.5 CVE-2016-5584 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93735
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3109-1
mysql-server-core-5.5 CVE-2016-5612 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-1601.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93630
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612
https://linux.oracle.com/cve/CVE-2016-5612.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://security.gentoo.org/glsa/201701-01
mysql-server-core-5.5 CVE-2016-5624 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93635
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
https://linux.oracle.com/cve/CVE-2016-5624.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
mysql-server-core-5.5 CVE-2016-5626 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93638
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
https://linux.oracle.com/cve/CVE-2016-5626.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-server-core-5.5 CVE-2016-5629 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93668
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-5629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
https://linux.oracle.com/cve/CVE-2016-5629.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-server-core-5.5 CVE-2016-6662 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
http://rhn.redhat.com/errata/RHSA-2016-2058.html
http://rhn.redhat.com/errata/RHSA-2016-2059.html
http://rhn.redhat.com/errata/RHSA-2016-2060.html
http://rhn.redhat.com/errata/RHSA-2016-2061.html
http://rhn.redhat.com/errata/RHSA-2016-2062.html
http://rhn.redhat.com/errata/RHSA-2016-2077.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Sep/23
http://www.debian.org/security/2016/dsa-3666
http://www.openwall.com/lists/oss-security/2016/09/12/3
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92912
http://www.securitytracker.com/id/1036769
https://access.redhat.com/security/cve/CVE-2016-6662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
https://jira.mariadb.org/browse/MDEV-10465
https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt
https://linux.oracle.com/cve/CVE-2016-6662.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/
https://security.gentoo.org/glsa/201701-01
https://ubuntu.com/security/notices/USN-3078-1
https://www.exploit-db.com/exploits/40360/
https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
mysql-server-core-5.5 CVE-2016-6663 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.openwall.com/lists/oss-security/2016/10/25/4
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92911
http://www.securityfocus.com/bid/93614
https://access.redhat.com/security/cve/CVE-2016-6663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html
https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805
https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6663.html
https://linux.oracle.com/errata/ELSA-2017-0184.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://www.exploit-db.com/exploits/40678/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
mysql-server-core-5.5 CVE-2016-6664 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.securityfocus.com/archive/1/539695/100/0/threaded
http://www.securityfocus.com/bid/93612
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2016-6664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt
https://linux.oracle.com/cve/CVE-2016-6664.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6664
https://security.gentoo.org/glsa/201702-18
https://www.exploit-db.com/exploits/40679/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
mysql-server-core-5.5 CVE-2016-7440 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.53-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2016/dsa-3706
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93659
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-7440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://ubuntu.com/security/notices/USN-3109-1
https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html
mysql-server-core-5.5 CVE-2016-8283 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.52-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
http://www.securityfocus.com/bid/93737
http://www.securitytracker.com/id/1037050
https://access.redhat.com/security/cve/CVE-2016-8283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
https://linux.oracle.com/cve/CVE-2016-8283.html
https://linux.oracle.com/errata/ELSA-2016-2595.html
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://security.gentoo.org/glsa/201701-01
mysql-server-core-5.5 CVE-2017-10268 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101390
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
https://linux.oracle.com/cve/CVE-2017-10268.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2017-10378 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101375
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2017-10378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
https://linux.oracle.com/cve/CVE-2017-10378.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2017-10379 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101415
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
https://linux.oracle.com/cve/CVE-2017-10379.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
mysql-server-core-5.5 CVE-2017-10384 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.58-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-4002
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL
http://www.securityfocus.com/bid/101406
http://www.securitytracker.com/id/1039597
https://access.redhat.com/errata/RHSA-2017:3265
https://access.redhat.com/errata/RHSA-2017:3442
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-10384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
https://linux.oracle.com/cve/CVE-2017-10384.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://security.netapp.com/advisory/ntap-20171019-0002/
https://ubuntu.com/security/notices/USN-3459-1
https://ubuntu.com/security/notices/USN-3459-2
mysql-server-core-5.5 CVE-2017-3238 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95571
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
https://linux.oracle.com/cve/CVE-2017-3238.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-core-5.5 CVE-2017-3243 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95538
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
https://linux.oracle.com/cve/CVE-2017-3243.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-core-5.5 CVE-2017-3244 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95565
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
https://linux.oracle.com/cve/CVE-2017-3244.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-core-5.5 CVE-2017-3258 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95560
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
https://linux.oracle.com/cve/CVE-2017-3258.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-core-5.5 CVE-2017-3265 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95520
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
https://linux.oracle.com/cve/CVE-2017-3265.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-core-5.5 CVE-2017-3291 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95501
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
https://linux.oracle.com/cve/CVE-2017-3291.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-core-5.5 CVE-2017-3305 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://riddle.link/
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/03/17/3
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97023
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/security/cve/CVE-2017-3305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3308 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97725
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3308.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3309 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97742
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html
https://linux.oracle.com/cve/CVE-2017-3309.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3312 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95491
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
https://linux.oracle.com/cve/CVE-2017-3312.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-core-5.5 CVE-2017-3313 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3809
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95527
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
https://linux.oracle.com/cve/CVE-2017-3313.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-core-5.5 CVE-2017-3317 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95585
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
https://linux.oracle.com/cve/CVE-2017-3317.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-core-5.5 CVE-2017-3318 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.54-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3767
http://www.debian.org/security/2017/dsa-3770
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
http://www.securityfocus.com/bid/95588
http://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
https://linux.oracle.com/cve/CVE-2017-3318.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18
https://ubuntu.com/security/notices/USN-3174-1
mysql-server-core-5.5 CVE-2017-3329 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97763
http://www.securitytracker.com/id/1038287
https://access.redhat.com/security/cve/CVE-2017-3329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3453 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97776
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
https://linux.oracle.com/cve/CVE-2017-3453.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3456 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97831
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
https://linux.oracle.com/cve/CVE-2017-3456.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3461 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97812
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3462 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97851
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3463 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97849
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3464 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3834
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
http://www.securityfocus.com/bid/97818
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
https://linux.oracle.com/cve/CVE-2017-3464.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3600 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3834
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97765
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3600
https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/
https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
https://linux.oracle.com/cve/CVE-2017-3600.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3635 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99730
http://www.securitytracker.com/id/1038928
https://access.redhat.com/security/cve/CVE-2017-3635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3636 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99736
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
https://linux.oracle.com/cve/CVE-2017-3636.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-server-core-5.5 CVE-2017-3641 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99767
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
https://linux.oracle.com/cve/CVE-2017-3641.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-server-core-5.5 CVE-2017-3648 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99789
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3651 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99802
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
https://linux.oracle.com/cve/CVE-2017-3651.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3652 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99805
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/security/cve/CVE-2017-3652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
mysql-server-core-5.5 CVE-2017-3653 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.57-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3922
http://www.debian.org/security/2017/dsa-3944
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
http://www.securityfocus.com/bid/99810
http://www.securitytracker.com/id/1038928
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2017-3653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
https://linux.oracle.com/cve/CVE-2017-3653.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://ubuntu.com/security/notices/USN-3357-1
https://ubuntu.com/security/notices/USN-3357-2
https://www.debian.org/security/2017/dsa-3955
mysql-server-core-5.5 CVE-2018-2562 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102713
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
https://linux.oracle.com/cve/CVE-2018-2562.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-2622 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102706
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
https://linux.oracle.com/cve/CVE-2018-2622.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-2640 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102678
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
https://linux.oracle.com/cve/CVE-2018-2640.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-2665 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102681
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
https://linux.oracle.com/cve/CVE-2018-2665.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-2668 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.59-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL
http://www.securityfocus.com/bid/102682
http://www.securitytracker.com/id/1040216
https://access.redhat.com/errata/RHSA-2018:0586
https://access.redhat.com/errata/RHSA-2018:0587
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
https://linux.oracle.com/cve/CVE-2018-2668.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.netapp.com/advisory/ntap-20180117-0002/
https://ubuntu.com/security/notices/USN-3537-1
https://ubuntu.com/security/notices/USN-3537-2
https://usn.ubuntu.com/3537-1/
https://usn.ubuntu.com/3537-2/
https://www.debian.org/security/2018/dsa-4091
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-2755 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103807
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
https://linux.oracle.com/cve/CVE-2018-2755.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-2761 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103820
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
https://linux.oracle.com/cve/CVE-2018-2761.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-2767 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.openwall.com/lists/oss-security/2018/04/08/2
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/103954
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/security/cve/CVE-2018-2767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
https://linux.oracle.com/cve/CVE-2018-2767.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-2771 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103828
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
https://linux.oracle.com/cve/CVE-2018-2771.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-2773 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103811
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
mysql-server-core-5.5 CVE-2018-2781 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103825
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
https://linux.oracle.com/cve/CVE-2018-2781.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-2813 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103830
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
https://linux.oracle.com/cve/CVE-2018-2813.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-2817 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103818
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
https://linux.oracle.com/cve/CVE-2018-2817.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-2818 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103824
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-2818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
mysql-server-core-5.5 CVE-2018-2819 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.60-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103814
http://www.securitytracker.com/id/1040698
https://access.redhat.com/errata/RHSA-2018:1254
https://access.redhat.com/errata/RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-2819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
https://linux.oracle.com/cve/CVE-2018-2819.html
https://linux.oracle.com/errata/ELSA-2018-2439.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20180419-0002/
https://ubuntu.com/security/notices/USN-3629-1
https://ubuntu.com/security/notices/USN-3629-2
https://ubuntu.com/security/notices/USN-3629-3
https://usn.ubuntu.com/3629-1/
https://usn.ubuntu.com/3629-2/
https://usn.ubuntu.com/3629-3/
https://www.debian.org/security/2018/dsa-4176
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-3058 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
https://linux.oracle.com/cve/CVE-2018-3058.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-3063 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104786
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
https://linux.oracle.com/cve/CVE-2018-3063.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-3066 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
https://linux.oracle.com/cve/CVE-2018-3066.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-3070 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104766
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/security/cve/CVE-2018-3070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3070
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://mariadb.com/kb/en/library/security-vulnerabilities-in-oracle-mysql-that-did-not-exist-in-mariadb/
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
mysql-server-core-5.5 CVE-2018-3081 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.61-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104779
http://www.securitytracker.com/id/1041294
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
https://linux.oracle.com/cve/CVE-2018-3081.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20180726-0002/
https://ubuntu.com/security/notices/USN-3725-1
https://ubuntu.com/security/notices/USN-3725-2
https://usn.ubuntu.com/3725-1/
https://usn.ubuntu.com/3725-2/
https://www.debian.org/security/2018/dsa-4341
mysql-server-core-5.5 CVE-2018-3133 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3133
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-server-core-5.5 CVE-2018-3174 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105612
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/security/cve/CVE-2018-3174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-server-core-5.5 CVE-2018-3282 MEDIUM 5.5.47-0ubuntu0.14.04.1 5.5.62-0ubuntu0.14.04.1
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105610
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:3655
https://access.redhat.com/errata/RHSA-2019:1258
https://access.redhat.com/errata/RHSA-2019:2327
https://access.redhat.com/security/cve/CVE-2018-3282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
https://linux.oracle.com/cve/CVE-2018-3282.html
https://linux.oracle.com/errata/ELSA-2019-2327.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
https://security.gentoo.org/glsa/201908-24
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3799-1
https://ubuntu.com/security/notices/USN-3799-2
https://usn.ubuntu.com/3799-1/
https://usn.ubuntu.com/3799-2/
https://www.debian.org/security/2018/dsa-4341
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL
mysql-server-core-5.5 CVE-2017-3302 LOW 5.5.47-0ubuntu0.14.04.1 5.5.55-0ubuntu0.14.04.1
Expand...http://www.debian.org/security/2017/dsa-3809
http://www.debian.org/security/2017/dsa-3834
http://www.openwall.com/lists/oss-security/2017/01/28/1
http://www.openwall.com/lists/oss-security/2017/02/11/11
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/96162
http://www.securitytracker.com/id/1038287
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://access.redhat.com/security/cve/CVE-2017-3302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
https://linux.oracle.com/cve/CVE-2017-3302.html
https://linux.oracle.com/errata/ELSA-2017-2192.html
https://ubuntu.com/security/notices/USN-3269-1
https://ubuntu.com/security/notices/USN-3357-2
ntpdate CVE-2015-7977 MEDIUM 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
http://rhn.redhat.com/errata/RHSA-2016-0780.html
http://rhn.redhat.com/errata/RHSA-2016-2583.html
http://support.ntp.org/bin/view/Main/NtpBug2939
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd
http://www.debian.org/security/2016/dsa-3629
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/81815
http://www.securitytracker.com/id/1034782
http://www.talosintel.com/reports/TALOS-2016-0074/
http://www.ubuntu.com/usn/USN-3096-1
https://access.redhat.com/security/cve/CVE-2015-7977
https://bto.bluecoat.com/security-advisory/sa113
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977
https://linux.oracle.com/cve/CVE-2015-7977.html
https://linux.oracle.com/errata/ELSA-2016-2583.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171031-0001/
https://ubuntu.com/security/notices/USN-3096-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
https://www.kb.cert.org/vuls/id/718152
ntpdate CVE-2015-7978 MEDIUM 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
http://rhn.redhat.com/errata/RHSA-2016-0780.html
http://rhn.redhat.com/errata/RHSA-2016-2583.html
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd
http://www.debian.org/security/2016/dsa-3629
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/81962
http://www.securitytracker.com/id/1034782
http://www.talosintel.com/reports/TALOS-2016-0075/
http://www.ubuntu.com/usn/USN-3096-1
https://access.redhat.com/security/cve/CVE-2015-7978
https://bto.bluecoat.com/security-advisory/sa113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978
https://linux.oracle.com/cve/CVE-2015-7978.html
https://linux.oracle.com/errata/ELSA-2016-2583.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171031-0001/
https://ubuntu.com/security/notices/USN-3096-1
https://www.kb.cert.org/vuls/id/718152
ntpdate CVE-2015-8138 MEDIUM 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html
http://lists.ntp.org/pipermail/hackers/2016-January/007406.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
http://rhn.redhat.com/errata/RHSA-2016-0063.html
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd
http://www.debian.org/security/2016/dsa-3629
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/81811
http://www.securitytracker.com/id/1034782
http://www.talosintel.com/reports/TALOS-2016-0077/
http://www.ubuntu.com/usn/USN-3096-1
https://access.redhat.com/security/cve/CVE-2015-8138
https://bto.bluecoat.com/security-advisory/sa113
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
https://linux.oracle.com/cve/CVE-2015-8138.html
https://linux.oracle.com/errata/ELSA-2016-0063.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171004-0002/
https://security.netapp.com/advisory/ntap-20171031-0001/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd
https://ubuntu.com/security/notices/USN-3096-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19
https://www.kb.cert.org/vuls/id/718152
ntpdate CVE-2016-1547 MEDIUM 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://rhn.redhat.com/errata/RHSA-2016-1552.html
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
http://www.debian.org/security/2016/dsa-3629
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/88276
http://www.securitytracker.com/id/1035705
http://www.talosintel.com/reports/TALOS-2016-0081/
http://www.talosintelligence.com/reports/TALOS-2016-0081/
https://access.redhat.com/errata/RHSA-2016:1141
https://access.redhat.com/security/cve/CVE-2016-1547
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547
https://linux.oracle.com/cve/CVE-2016-1547.html
https://linux.oracle.com/errata/ELSA-2016-1141.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171004-0002/
https://ubuntu.com/security/notices/USN-3096-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19
ntpdate CVE-2016-1548 MEDIUM 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html
http://rhn.redhat.com/errata/RHSA-2016-1552.html
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd
http://www.debian.org/security/2016/dsa-3629
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/archive/1/538233/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded
http://www.securityfocus.com/bid/88264
http://www.securitytracker.com/id/1035705
http://www.talosintel.com/reports/TALOS-2016-0082/
http://www.talosintelligence.com/reports/TALOS-2016-0082/
http://www.ubuntu.com/usn/USN-3096-1
https://access.redhat.com/errata/RHSA-2016:1141
https://access.redhat.com/security/cve/CVE-2016-1548
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548
https://linux.oracle.com/cve/CVE-2016-1548.html
https://linux.oracle.com/errata/ELSA-2016-1141.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171004-0002/
https://ubuntu.com/security/notices/USN-3096-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19
https://www.debian.org/security/2016/dsa-3629
https://www.kb.cert.org/vuls/id/718152
https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082
ntpdate CVE-2016-1550 MEDIUM 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html
http://rhn.redhat.com/errata/RHSA-2016-1552.html
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd
http://www.debian.org/security/2016/dsa-3629
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/archive/1/538233/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded
http://www.securityfocus.com/bid/88261
http://www.securitytracker.com/id/1035705
http://www.talosintel.com/reports/TALOS-2016-0084/
http://www.talosintelligence.com/reports/TALOS-2016-0084/
http://www.ubuntu.com/usn/USN-3096-1
https://access.redhat.com/errata/RHSA-2016:1141
https://access.redhat.com/security/cve/CVE-2016-1550
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550
https://linux.oracle.com/cve/CVE-2016-1550.html
https://linux.oracle.com/errata/ELSA-2016-1141.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171004-0002/
https://ubuntu.com/security/notices/USN-3096-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19
https://www.debian.org/security/2016/dsa-3629
https://www.kb.cert.org/vuls/id/718152
https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0084
ntpdate CVE-2016-2516 MEDIUM 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://support.ntp.org/bin/view/Main/NtpBug3011
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
http://www.debian.org/security/2016/dsa-3629
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/88180
http://www.securitytracker.com/id/1035705
https://access.redhat.com/security/cve/CVE-2016-2516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171004-0002/
https://ubuntu.com/security/notices/USN-3096-1
https://www.kb.cert.org/vuls/id/718152
ntpdate CVE-2018-7183 MEDIUM 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.13
Expand...http://support.ntp.org/bin/view/Main/NtpBug3414
http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S
http://www.kb.cert.org/vuls/id/961909
http://www.securityfocus.com/bid/103351
https://access.redhat.com/security/cve/CVE-2018-7183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7183
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc
https://security.gentoo.org/glsa/201805-12
https://security.netapp.com/advisory/ntap-20180626-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
https://ubuntu.com/security/notices/USN-3707-1
https://ubuntu.com/security/notices/USN-3707-2
https://usn.ubuntu.com/3707-1/
https://usn.ubuntu.com/3707-2/
https://www.synology.com/support/security/Synology_SA_18_13
ntpdate CVE-2015-7973 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
http://support.ntp.org/bin/view/Main/NtpBug2935
http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd
http://www.securityfocus.com/bid/81963
http://www.securitytracker.com/id/1034782
http://www.talosintel.com/reports/TALOS-2016-0070/
http://www.ubuntu.com/usn/USN-3096-1
https://access.redhat.com/security/cve/CVE-2015-7973
https://bto.bluecoat.com/security-advisory/sa113
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171031-0001/
https://ubuntu.com/security/notices/USN-3096-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
https://www.kb.cert.org/vuls/id/718152
ntpdate CVE-2015-7974 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://bugs.ntp.org/show_bug.cgi?id=2936
http://rhn.redhat.com/errata/RHSA-2016-2583.html
http://support.ntp.org/bin/view/Main/NtpBug2936
http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
http://www.debian.org/security/2016/dsa-3629
http://www.securityfocus.com/bid/81960
http://www.securitytracker.com/id/1034782
http://www.talosintel.com/reports/TALOS-2016-0071/
https://access.redhat.com/security/cve/CVE-2015-7974
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
https://linux.oracle.com/cve/CVE-2015-7974.html
https://linux.oracle.com/errata/ELSA-2016-2583.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171031-0001/
https://ubuntu.com/security/notices/USN-3096-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
ntpdate CVE-2015-7976 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
http://support.ntp.org/bin/view/Main/NtpBug2938
http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd
http://www.securitytracker.com/id/1034782
http://www.talosintel.com/reports/TALOS-2016-0073/
http://www.ubuntu.com/usn/USN-3096-1
https://access.redhat.com/security/cve/CVE-2015-7976
https://bto.bluecoat.com/security-advisory/sa113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171031-0001/
https://ubuntu.com/security/notices/USN-3096-1
https://www.kb.cert.org/vuls/id/718152
ntpdate CVE-2015-7979 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
http://rhn.redhat.com/errata/RHSA-2016-1552.html
http://rhn.redhat.com/errata/RHSA-2016-2583.html
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd
http://www.debian.org/security/2016/dsa-3629
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/81816
http://www.securitytracker.com/id/1034782
http://www.talosintel.com/reports/TALOS-2016-0076/
http://www.ubuntu.com/usn/USN-3096-1
https://access.redhat.com/errata/RHSA-2016:1141
https://access.redhat.com/security/cve/CVE-2015-7979
https://bto.bluecoat.com/security-advisory/sa113
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
https://linux.oracle.com/cve/CVE-2015-7979.html
https://linux.oracle.com/errata/ELSA-2016-2583.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171031-0001/
https://ubuntu.com/security/notices/USN-3096-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
https://www.kb.cert.org/vuls/id/718152
ntpdate CVE-2015-8158 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://rhn.redhat.com/errata/RHSA-2016-2583.html
http://support.ntp.org/bin/view/Main/NtpBug2948
http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
http://www.debian.org/security/2016/dsa-3629
http://www.securityfocus.com/bid/81814
http://www.securitytracker.com/id/1034782
http://www.talosintel.com/reports/TALOS-2016-0080/
https://access.redhat.com/security/cve/CVE-2015-8158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
https://linux.oracle.com/cve/CVE-2015-8158.html
https://linux.oracle.com/errata/ELSA-2016-2583.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171031-0001/
https://ubuntu.com/security/notices/USN-3096-1
https://www.kb.cert.org/vuls/id/718152
ntpdate CVE-2016-0727 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://packetstormsecurity.com/files/141913/NTP-Privilege-Escalation.html
http://www.halfdog.net/Security/2015/NtpCronjobUserNtpToRootPrivilegeEscalation/
http://www.securityfocus.com/bid/81552
http://www.securitytracker.com/id/1034808
http://www.ubuntu.com/usn/USN-3096-1
https://access.redhat.com/security/cve/CVE-2016-0727
https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1528050
https://bugzilla.redhat.com/show_bug.cgi?id=1382369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0727
https://ubuntu.com/security/notices/USN-3096-1
ntpdate CVE-2016-2518 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html
http://rhn.redhat.com/errata/RHSA-2016-1552.html
http://support.ntp.org/bin/view/Main/NtpBug3009
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd
http://www.debian.org/security/2016/dsa-3629
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/archive/1/538233/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded
http://www.securityfocus.com/bid/88226
http://www.securitytracker.com/id/1035705
http://www.ubuntu.com/usn/USN-3096-1
https://access.redhat.com/errata/RHSA-2016:1141
https://access.redhat.com/security/cve/CVE-2016-2518
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518
https://linux.oracle.com/cve/CVE-2016-2518.html
https://linux.oracle.com/errata/ELSA-2016-1141.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171004-0002/
https://support.f5.com/csp/article/K20804323
https://ubuntu.com/security/notices/USN-3096-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
https://www.debian.org/security/2016/dsa-3629
https://www.kb.cert.org/vuls/id/718152
ntpdate CVE-2016-4954 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://bugs.ntp.org/3044
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html
http://support.ntp.org/bin/view/Main/NtpBug3044
http://support.ntp.org/bin/view/Main/SecurityNotice
http://support.ntp.org/bin/view/Main/SecurityNotice#June_2016_ntp_4_2_8p8_NTP_Securi
http://www.kb.cert.org/vuls/id/321640
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securitytracker.com/id/1036037
https://access.redhat.com/security/cve/CVE-2016-4954
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://ubuntu.com/security/notices/USN-3096-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
ntpdate CVE-2016-4955 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://bugs.ntp.org/3043
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html
http://support.ntp.org/bin/view/Main/NtpBug3043
http://support.ntp.org/bin/view/Main/SecurityNotice
http://support.ntp.org/bin/view/Main/SecurityNotice#June_2016_ntp_4_2_8p8_NTP_Securi
http://www.kb.cert.org/vuls/id/321640
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/91007
http://www.securitytracker.com/id/1036037
https://access.redhat.com/security/cve/CVE-2016-4955
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://ubuntu.com/security/notices/USN-3096-1
ntpdate CVE-2016-4956 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Expand...http://bugs.ntp.org/3042
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html
http://support.ntp.org/bin/view/Main/NtpBug3042
http://support.ntp.org/bin/view/Main/SecurityNotice
http://support.ntp.org/bin/view/Main/SecurityNotice#June_2016_ntp_4_2_8p8_NTP_Securi
http://www.kb.cert.org/vuls/id/321640
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/91009
http://www.securitytracker.com/id/1036037
https://access.redhat.com/security/cve/CVE-2016-4956
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc
https://security.gentoo.org/glsa/201607-15
https://ubuntu.com/security/notices/USN-3096-1
ntpdate CVE-2016-7426 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.11
Expand...http://nwtime.org/ntp428p9_release/
http://rhn.redhat.com/errata/RHSA-2017-0252.html
http://support.ntp.org/bin/view/Main/NtpBug3071
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
http://www.securityfocus.com/bid/94451
http://www.securitytracker.com/id/1037354
https://access.redhat.com/security/cve/CVE-2016-7426
https://bto.bluecoat.com/security-advisory/sa139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
https://linux.oracle.com/cve/CVE-2016-7426.html
https://linux.oracle.com/errata/ELSA-2017-0252.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc
https://ubuntu.com/security/notices/USN-3349-1
https://ubuntu.com/security/notices/USN-3707-2
https://usn.ubuntu.com/3707-2/
https://www.kb.cert.org/vuls/id/633847
ntpdate CVE-2016-7427 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.11
Expand...http://nwtime.org/ntp428p9_release/
http://support.ntp.org/bin/view/Main/NtpBug3114
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
http://www.securityfocus.com/bid/94447
http://www.securitytracker.com/id/1037354
https://access.redhat.com/security/cve/CVE-2016-7427
https://bto.bluecoat.com/security-advisory/sa139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03883en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03899en_us
https://ubuntu.com/security/notices/USN-3349-1
https://ubuntu.com/security/notices/USN-3707-2
https://usn.ubuntu.com/3707-2/
https://www.kb.cert.org/vuls/id/633847
https://www.talosintelligence.com/reports/TALOS-2016-0131/
ntpdate CVE-2016-7428 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.11
Expand...http://nwtime.org/ntp428p9_release/
http://support.ntp.org/bin/view/Main/NtpBug3113
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
http://www.securityfocus.com/bid/94446
http://www.securitytracker.com/id/1037354
http://www.talosintelligence.com/reports/TALOS-2016-0130/
https://access.redhat.com/security/cve/CVE-2016-7428
https://bto.bluecoat.com/security-advisory/sa139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03883en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03899en_us
https://ubuntu.com/security/notices/USN-3349-1
https://ubuntu.com/security/notices/USN-3707-2
https://usn.ubuntu.com/3707-2/
https://www.kb.cert.org/vuls/id/633847
ntpdate CVE-2016-7429 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.11
Expand...http://nwtime.org/ntp428p9_release/
http://rhn.redhat.com/errata/RHSA-2017-0252.html
http://support.ntp.org/bin/view/Main/NtpBug3072
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/94453
http://www.securitytracker.com/id/1037354
https://access.redhat.com/security/cve/CVE-2016-7429
https://bto.bluecoat.com/security-advisory/sa139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
https://linux.oracle.com/cve/CVE-2016-7429.html
https://linux.oracle.com/errata/ELSA-2017-0252.html
https://ubuntu.com/security/notices/USN-3349-1
https://www.kb.cert.org/vuls/id/633847
ntpdate CVE-2016-9310 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.11
Expand...http://nwtime.org/ntp428p9_release/
http://rhn.redhat.com/errata/RHSA-2017-0252.html
http://support.ntp.org/bin/view/Main/NtpBug3118
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
http://www.securityfocus.com/bid/94452
http://www.securitytracker.com/id/1037354
http://www.talosintelligence.com/reports/TALOS-2016-0203/
https://access.redhat.com/security/cve/CVE-2016-9310
https://bto.bluecoat.com/security-advisory/sa139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
https://linux.oracle.com/cve/CVE-2016-9310.html
https://linux.oracle.com/errata/ELSA-2017-0252.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03799en_us
https://ubuntu.com/security/notices/USN-3349-1
https://ubuntu.com/security/notices/USN-3707-2
https://usn.ubuntu.com/3707-2/
https://www.kb.cert.org/vuls/id/633847
ntpdate CVE-2016-9311 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.11
Expand...http://nwtime.org/ntp428p9_release/
http://rhn.redhat.com/errata/RHSA-2017-0252.html
http://support.ntp.org/bin/view/Main/NtpBug3119
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
http://www.securityfocus.com/bid/94444
http://www.securitytracker.com/id/1037354
http://www.talosintelligence.com/reports/TALOS-2016-0204/
https://access.redhat.com/security/cve/CVE-2016-9311
https://bto.bluecoat.com/security-advisory/sa139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
https://linux.oracle.com/cve/CVE-2016-9311.html
https://linux.oracle.com/errata/ELSA-2017-0252.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03799en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03885en_us
https://ubuntu.com/security/notices/USN-3349-1
https://ubuntu.com/security/notices/USN-3707-2
https://usn.ubuntu.com/3707-2/
https://www.kb.cert.org/vuls/id/633847
ntpdate CVE-2017-6458 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.11
Expand...http://support.ntp.org/bin/view/Main/NtpBug3379
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
http://www.securityfocus.com/bid/97051
http://www.securitytracker.com/id/1038123
https://access.redhat.com/security/cve/CVE-2017-6458
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6458
https://support.apple.com/HT208144
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
https://ubuntu.com/security/notices/USN-3349-1
ntpdate CVE-2017-6462 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.11
Expand...http://support.ntp.org/bin/view/Main/NtpBug3388
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
http://www.securityfocus.com/bid/97045
http://www.securitytracker.com/id/1038123
https://access.redhat.com/errata/RHSA-2017:3071
https://access.redhat.com/errata/RHSA-2018:0855
https://access.redhat.com/security/cve/CVE-2017-6462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462
https://linux.oracle.com/cve/CVE-2017-6462.html
https://linux.oracle.com/errata/ELSA-2018-0855.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc
https://support.apple.com/HT208144
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
https://ubuntu.com/security/notices/USN-3349-1
https://ubuntu.com/security/notices/USN-3707-2
https://usn.ubuntu.com/3707-2/
ntpdate CVE-2017-6463 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.11
Expand...http://support.ntp.org/bin/view/Main/NtpBug3387
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
http://www.securityfocus.com/bid/97049
http://www.securitytracker.com/id/1038123
https://access.redhat.com/errata/RHSA-2017:3071
https://access.redhat.com/errata/RHSA-2018:0855
https://access.redhat.com/security/cve/CVE-2017-6463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463
https://linux.oracle.com/cve/CVE-2017-6463.html
https://linux.oracle.com/errata/ELSA-2018-0855.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc
https://support.apple.com/HT208144
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
https://ubuntu.com/security/notices/USN-3349-1
https://ubuntu.com/security/notices/USN-3707-2
https://usn.ubuntu.com/3707-2/
ntpdate CVE-2017-6464 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.11
Expand...http://support.ntp.org/bin/view/Main/NtpBug3389
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
http://www.securityfocus.com/bid/97050
http://www.securitytracker.com/id/1038123
https://access.redhat.com/errata/RHSA-2017:3071
https://access.redhat.com/errata/RHSA-2018:0855
https://access.redhat.com/security/cve/CVE-2017-6464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464
https://linux.oracle.com/cve/CVE-2017-6464.html
https://linux.oracle.com/errata/ELSA-2018-0855.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc
https://support.apple.com/HT208144
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
https://ubuntu.com/security/notices/USN-3349-1
ntpdate CVE-2018-7185 LOW 1:4.2.6.p5+dfsg-3ubuntu2.14.04.6 1:4.2.6.p5+dfsg-3ubuntu2.14.04.13
Expand...http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
http://support.ntp.org/bin/view/Main/NtpBug3454
http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S
http://www.kb.cert.org/vuls/id/961909
http://www.securityfocus.com/archive/1/541824/100/0/threaded
http://www.securityfocus.com/bid/103339
https://access.redhat.com/security/cve/CVE-2018-7185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc
https://security.gentoo.org/glsa/201805-12
https://security.netapp.com/advisory/ntap-20180626-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
https://ubuntu.com/security/notices/USN-3707-1
https://ubuntu.com/security/notices/USN-3707-2
https://usn.ubuntu.com/3707-1/
https://usn.ubuntu.com/3707-2/
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.synology.com/support/security/Synology_SA_18_13
openssh-client CVE-2016-6515 MEDIUM 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.8
Expand...http://openwall.com/lists/oss-security/2016/08/01/2
http://packetstormsecurity.com/files/140070/OpenSSH-7.2-Denial-Of-Service.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/92212
http://www.securitytracker.com/id/1036487
https://access.redhat.com/errata/RHSA-2017:2029
https://access.redhat.com/security/cve/CVE-2016-6515
https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6515
https://github.com/openssh/openssh-portable/commit/fcd135c9df440bcd2d5870405ad3311743d78d97
https://linux.oracle.com/cve/CVE-2016-6515.html
https://linux.oracle.com/errata/ELSA-2017-2029.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2L6RW34VFNXYNVVN2CN73YAGJ5VMTFU/
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:06.openssh.asc
https://security.netapp.com/advisory/ntap-20171130-0003/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03779en_us
https://ubuntu.com/security/notices/USN-3061-1
https://www.exploit-db.com/exploits/40888/
openssh-client CVE-2018-20685 MEDIUM 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.12
Expand...http://www.securityfocus.com/bid/106531
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2018-20685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685
https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h
https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
https://linux.oracle.com/cve/CVE-2018-20685.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.gentoo.org/glsa/202007-53
https://security.netapp.com/advisory/ntap-20190215-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
openssh-client CVE-2019-6109 MEDIUM 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.12
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6109.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
openssh-client CVE-2015-8325 LOW 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.7
Expand...http://rhn.redhat.com/errata/RHSA-2016-2588.html
http://rhn.redhat.com/errata/RHSA-2017-0641.html
http://www.debian.org/security/2016/dsa-3550
http://www.securityfocus.com/bid/86187
http://www.securitytracker.com/id/1036487
https://access.redhat.com/security/cve/CVE-2015-8325
https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755
https://bugzilla.redhat.com/show_bug.cgi?id=1328012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325
https://linux.oracle.com/cve/CVE-2015-8325.html
https://linux.oracle.com/errata/ELSA-2017-0641.html
https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325.html
https://security-tracker.debian.org/tracker/CVE-2015-8325
https://security.gentoo.org/glsa/201612-18
https://security.netapp.com/advisory/ntap-20180628-0001/
https://ubuntu.com/security/notices/USN-2966-1
openssh-client CVE-2016-10009 LOW 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.10
Expand...http://packetstormsecurity.com/files/140261/OpenSSH-Arbitrary-Library-Loading.html
http://www.openwall.com/lists/oss-security/2016/12/19/2
http://www.securityfocus.com/bid/94968
http://www.securitytracker.com/id/1037490
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637
https://access.redhat.com/errata/RHSA-2017:2029
https://access.redhat.com/security/cve/CVE-2016-10009
https://bugs.chromium.org/p/project-zero/issues/detail?id=1009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009
https://github.com/openbsd/src/commit/9476ce1dd37d3c3218d5640b74c34c65e5f4efe5
https://linux.oracle.com/cve/CVE-2016-10009.html
https://linux.oracle.com/errata/ELSA-2017-2029.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:01.openssh.asc
https://security.netapp.com/advisory/ntap-20171130-0002/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us
https://ubuntu.com/security/notices/USN-3538-1
https://usn.ubuntu.com/3538-1/
https://www.exploit-db.com/exploits/40963/
https://www.openssh.com/txt/release-7.4
openssh-client CVE-2016-10011 LOW 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.10
Expand...http://www.openwall.com/lists/oss-security/2016/12/19/2
http://www.securityfocus.com/bid/94977
http://www.securitytracker.com/id/1037490
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637
https://access.redhat.com/errata/RHSA-2017:2029
https://access.redhat.com/security/cve/CVE-2016-10011
https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10011
https://github.com/openbsd/src/commit/ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9
https://linux.oracle.com/cve/CVE-2016-10011.html
https://linux.oracle.com/errata/ELSA-2017-2029.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html
https://security.netapp.com/advisory/ntap-20171130-0002/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us
https://ubuntu.com/security/notices/USN-3538-1
https://www.openssh.com/txt/release-7.4
openssh-client CVE-2016-10012 LOW 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.10
Expand...http://www.openwall.com/lists/oss-security/2016/12/19/2
http://www.securityfocus.com/bid/94975
http://www.securitytracker.com/id/1037490
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637
https://access.redhat.com/errata/RHSA-2017:2029
https://access.redhat.com/security/cve/CVE-2016-10012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012
https://github.com/openbsd/src/commit/3095060f479b86288e31c79ecbc5131a66bcd2f9
https://linux.oracle.com/cve/CVE-2016-10012.html
https://linux.oracle.com/errata/ELSA-2017-2029.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html
https://security.netapp.com/advisory/ntap-20171130-0002/
https://support.f5.com/csp/article/K62201745?utm_source=f5support&utm_medium=RSS
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us
https://ubuntu.com/security/notices/USN-3538-1
https://www.openssh.com/txt/release-7.4
openssh-client CVE-2016-10708 LOW 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.11
Expand...http://blog.swiecki.net/2018/01/fuzzing-tcp-servers.html
http://www.securityfocus.com/bid/102780
https://access.redhat.com/security/cve/CVE-2016-10708
https://anongit.mindrot.org/openssh.git/commit/?id=28652bca29046f62c7045e933e6b931de1d16737
https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10708
https://kc.mcafee.com/corporate/index?page=content&id=SB10284
https://lists.debian.org/debian-lts-announce/2018/01/msg00031.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html
https://security.netapp.com/advisory/ntap-20180423-0003/
https://support.f5.com/csp/article/K32485746?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3809-1
https://usn.ubuntu.com/3809-1/
https://www.openssh.com/releasenotes.html
openssh-client CVE-2016-1908 LOW 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.7
Expand...http://openwall.com/lists/oss-security/2016/01/15/13
http://rhn.redhat.com/errata/RHSA-2016-0465.html
http://rhn.redhat.com/errata/RHSA-2016-0741.html
http://seclists.org/oss-sec/2016/q1/115
http://www.openssh.com/txt/release-7.2
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/84427
http://www.securitytracker.com/id/1034705
https://access.redhat.com/security/cve/CVE-2016-1908
https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c
https://bugzilla.redhat.com/show_bug.cgi?id=1298741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1908
https://linux.oracle.com/cve/CVE-2016-1908.html
https://linux.oracle.com/errata/ELSA-2016-0741.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html
https://lists.mindrot.org/pipermail/openssh-unix-dev/2016-January/034684.html
https://security.gentoo.org/glsa/201612-18
https://thejh.net/written-stuff/openssh-6.8-xsecurity
https://ubuntu.com/security/notices/USN-2966-1
openssh-client CVE-2016-3115 LOW 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.7
Expand...http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c.diff?r1=1.281&r2=1.282&f=h
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183101.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183122.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178838.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179924.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180491.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184264.html
http://packetstormsecurity.com/files/136234/OpenSSH-7.2p1-xauth-Command-Injection-Bypass.html
http://rhn.redhat.com/errata/RHSA-2016-0465.html
http://rhn.redhat.com/errata/RHSA-2016-0466.html
http://seclists.org/fulldisclosure/2016/Mar/46
http://seclists.org/fulldisclosure/2016/Mar/47
http://www.openssh.com/txt/x11fwd.adv
http://www.openwall.com/lists/oss-security/2016/03/10/16
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/84314
http://www.securitytracker.com/id/1035249
https://access.redhat.com/security/cve/CVE-2016-3115
https://bto.bluecoat.com/security-advisory/sa121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115
https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3115
https://linux.oracle.com/cve/CVE-2016-3115.html
https://linux.oracle.com/errata/ELSA-2016-3531.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html
https://security.gentoo.org/glsa/201612-18
https://ubuntu.com/security/notices/USN-2966-1
https://www.exploit-db.com/exploits/39569/
https://www.freebsd.org/security/advisories/FreeBSD-SA-16:14.openssh.asc
openssh-client CVE-2016-6210 LOW 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.8
Expand...http://seclists.org/fulldisclosure/2016/Jul/51
http://www.debian.org/security/2016/dsa-3626
http://www.securityfocus.com/bid/91812
http://www.securitytracker.com/id/1036319
https://access.redhat.com/errata/RHSA-2017:2029
https://access.redhat.com/errata/RHSA-2017:2563
https://access.redhat.com/security/cve/CVE-2016-6210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210
https://linux.oracle.com/cve/CVE-2016-6210.html
https://linux.oracle.com/errata/ELSA-2017-2563.html
https://security.gentoo.org/glsa/201612-18
https://security.netapp.com/advisory/ntap-20190206-0001/
https://ubuntu.com/security/notices/USN-3061-1
https://www.exploit-db.com/exploits/40113/
https://www.exploit-db.com/exploits/40136/
https://www.openssh.com/txt/release-7.3
openssh-client CVE-2017-15906 LOW 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.10
Expand...http://www.securityfocus.com/bid/101552
https://access.redhat.com/errata/RHSA-2018:0980
https://access.redhat.com/security/cve/CVE-2017-15906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15906
https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19
https://linux.oracle.com/cve/CVE-2017-15906.html
https://linux.oracle.com/errata/ELSA-2018-0980.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html
https://security.gentoo.org/glsa/201801-05
https://security.netapp.com/advisory/ntap-20180423-0004/
https://ubuntu.com/security/notices/USN-3538-1
https://www.openssh.com/txt/release-7.6
https://www.oracle.com/security-alerts/cpujan2020.html
https://xorl.wordpress.com/2017/11/13/openssh-sftp-server-remote-security-vulnerability/
openssh-client CVE-2018-15473 LOW 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.11
Expand...http://www.openwall.com/lists/oss-security/2018/08/15/5
http://www.securityfocus.com/bid/105140
http://www.securitytracker.com/id/1041487
https://access.redhat.com/errata/RHSA-2019:0711
https://access.redhat.com/errata/RHSA-2019:2143
https://access.redhat.com/security/cve/CVE-2018-15473
https://bugs.debian.org/906236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15473
https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0
https://linux.oracle.com/cve/CVE-2018-15473.html
https://linux.oracle.com/errata/ELSA-2019-2143.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011
https://security.gentoo.org/glsa/201810-03
https://security.netapp.com/advisory/ntap-20181101-0001/
https://ubuntu.com/security/notices/USN-3809-1
https://usn.ubuntu.com/3809-1/
https://www.debian.org/security/2018/dsa-4280
https://www.exploit-db.com/exploits/45210/
https://www.exploit-db.com/exploits/45233/
https://www.exploit-db.com/exploits/45939/
https://www.oracle.com/security-alerts/cpujan2020.html
openssh-client CVE-2019-6111 LOW 1:6.6p1-2ubuntu2.6 1:6.6p1-2ubuntu2.13
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
http://www.openwall.com/lists/oss-security/2019/04/18/1
http://www.securityfocus.com/bid/106741
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6111
https://bugzilla.redhat.com/show_bug.cgi?id=1677794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6111.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://ubuntu.com/security/notices/USN-3885-2
https://usn.ubuntu.com/3885-1/
https://usn.ubuntu.com/3885-2/
https://www.debian.org/security/2019/dsa-4387
https://www.exploit-db.com/exploits/46193/
https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
openssl CVE-2016-2107 HIGH 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.19
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://source.android.com/security/bulletin/2016-07-01.html
http://support.citrix.com/article/CTX212736
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html
http://www.debian.org/security/2016/dsa-3566
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/89760
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035721
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
http://www.ubuntu.com/usn/USN-2959-1
https://access.redhat.com/security/cve/CVE-2016-2107
https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/
https://bto.bluecoat.com/security-advisory/sa123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107
https://git.openssl.org/?p=openssl.git;a=commit;h=68595c0c2886e7942a14f98c17a55a88afb6c292
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
https://kc.mcafee.com/corporate/index?page=content&id=SB10160
https://linux.oracle.com/cve/CVE-2016-2107.html
https://linux.oracle.com/errata/ELSA-2016-3571.html
https://openssl.org/news/secadv/20160503.txt
https://security.gentoo.org/glsa/201612-16
https://security.netapp.com/advisory/ntap-20160504-0001/
https://support.apple.com/HT206903
https://ubuntu.com/security/notices/USN-2959-1
https://www.exploit-db.com/exploits/39768/
https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
https://www.openssl.org/news/secadv/20160503.txt
https://www.tenable.com/security/tns-2016-18
openssl CVE-2016-2108 HIGH 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.19
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-2056.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://source.android.com/security/bulletin/2016-07-01.html
http://support.citrix.com/article/CTX212736
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
http://www.debian.org/security/2016/dsa-3566
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/89752
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035721
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
http://www.ubuntu.com/usn/USN-2959-1
https://access.redhat.com/errata/RHSA-2016:1137
https://access.redhat.com/errata/RHSA-2017:0193
https://access.redhat.com/errata/RHSA-2017:0194
https://access.redhat.com/security/cve/CVE-2016-2108
https://bto.bluecoat.com/security-advisory/sa123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108
https://git.openssl.org/?p=openssl.git;a=commit;h=3661bb4e7934668bd99ca777ea8b30eedfafa871
https://git.openssl.org/?p=openssl.git;a=commit;h=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
https://linux.oracle.com/cve/CVE-2016-2108.html
https://linux.oracle.com/errata/ELSA-2016-3571.html
https://openssl.org/news/secadv/20160503.txt
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067&languageid=en-fr
https://security.gentoo.org/glsa/201612-16
https://security.netapp.com/advisory/ntap-20160504-0001/
https://support.apple.com/HT206903
https://ubuntu.com/security/notices/USN-2959-1
https://www.openssl.org/news/secadv/20160503.txt
https://www.tenable.com/security/tns-2016-18
openssl CVE-2016-6304 HIGH 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://rhn.redhat.com/errata/RHSA-2016-2802.html
http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/fulldisclosure/2016/Dec/47
http://seclists.org/fulldisclosure/2016/Oct/62
http://seclists.org/fulldisclosure/2017/Jul/31
http://security.360.cn/cve/CVE-2016-6304/
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/93150
http://www.securitytracker.com/id/1036878
http://www.securitytracker.com/id/1037640
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/security/cve/CVE-2016-6304
https://bto.bluecoat.com/security-advisory/sa132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304
https://git.openssl.org/?p=openssl.git;a=commit;h=2c0d295e26306e15a92eb23a84a1802005c1c137
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://linux.oracle.com/cve/CVE-2016-6304.html
https://linux.oracle.com/errata/ELSA-2016-3621.html
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://security.gentoo.org/glsa/201612-16
https://ubuntu.com/security/notices/USN-3087-1
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.openssl.org/news/secadv/20160922.txt
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
openssl CVE-2016-2109 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.19
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-2056.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
http://www.debian.org/security/2016/dsa-3566
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/87940
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035721
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
http://www.ubuntu.com/usn/USN-2959-1
https://access.redhat.com/security/cve/CVE-2016-2109
https://bto.bluecoat.com/security-advisory/sa123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109
https://git.openssl.org/?p=openssl.git;a=commit;h=c62981390d6cf9e3d612c489b8b77c2913b25807
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
https://kc.mcafee.com/corporate/index?page=content&id=SB10160
https://linux.oracle.com/cve/CVE-2016-2109.html
https://linux.oracle.com/errata/ELSA-2016-3576.html
https://openssl.org/news/secadv/20160503.txt
https://security.gentoo.org/glsa/201612-16
https://security.netapp.com/advisory/ntap-20160504-0001/
https://source.android.com/security/bulletin/2017-07-01
https://support.apple.com/HT206903
https://ubuntu.com/security/notices/USN-2959-1
https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
https://www.openssl.org/news/secadv/20160503.txt
https://www.tenable.com/security/tns-2016-18
openssl CVE-2016-2842 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.18
Expand...http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=bugtraq&m=146108058503441&w=2
http://openssl.org/news/secadv/20160301.txt
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/84169
https://access.redhat.com/security/cve/CVE-2016-2842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2842
https://git.openssl.org/?p=openssl.git;a=commit;h=578b956fe741bf8e84055547b1e83c28dd902c73
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kc.mcafee.com/corporate/index?page=content&id=SB10152
https://linux.oracle.com/cve/CVE-2016-2842.html
https://linux.oracle.com/errata/ELSA-2016-3571.html
https://security.netapp.com/advisory/ntap-20160321-0001/
openssl CVE-2016-6303 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/92984
http://www.securitytracker.com/id/1036885
https://access.redhat.com/security/cve/CVE-2016-6303
https://bto.bluecoat.com/security-advisory/sa132
https://bugzilla.redhat.com/show_bug.cgi?id=1370146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303
https://git.openssl.org/?p=openssl.git;a=commit;h=55d83bf7c10c7b205fffa23fa7c3977491e56c07
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://ubuntu.com/security/notices/USN-3087-1
https://www.openssl.org/news/secadv/20160922.txt
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
openssl CVE-2016-6306 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/93153
http://www.securitytracker.com/id/1036885
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
https://access.redhat.com/security/cve/CVE-2016-6306
https://bto.bluecoat.com/security-advisory/sa132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306
https://git.openssl.org/?p=openssl.git;a=commit;h=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://linux.oracle.com/cve/CVE-2016-6306.html
https://linux.oracle.com/errata/ELSA-2016-3627.html
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://security.gentoo.org/glsa/201612-16
https://support.f5.com/csp/article/K90492697
https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://ubuntu.com/security/notices/USN-3087-1
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.openssl.org/news/secadv/20160922.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
openssl CVE-2016-7056 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.22
Expand...http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://www.securityfocus.com/bid/95375
http://www.securitytracker.com/id/1037575
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/security/cve/CVE-2016-7056
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7056
https://eprint.iacr.org/2016/1195
https://eprint.iacr.org/2016/1195.pdf
https://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/033_libcrypto.patch.sig
https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/016_libcrypto.patch.sig
https://git.openssl.org/?p=openssl.git;a=commit;h=8aed2a7548362e88e84a7feb795a3a97e8395008
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7056.html
https://seclists.org/oss-sec/2017/q1/52
https://security-tracker.debian.org/tracker/CVE-2016-7056
https://ubuntu.com/security/notices/USN-3181-1
https://www.debian.org/security/2017/dsa-3773
openssl CVE-2017-3731 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.22
Expand...http://rhn.redhat.com/errata/RHSA-2017-0286.html
http://www.debian.org/security/2017/dsa-3773
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/95813
http://www.securitytracker.com/id/1037717
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
https://access.redhat.com/security/cve/CVE-2017-3731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731
https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21
https://linux.oracle.com/cve/CVE-2017-3731.html
https://linux.oracle.com/errata/ELSA-2017-0286.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc
https://security.gentoo.org/glsa/201702-07
https://security.netapp.com/advisory/ntap-20171019-0002/
https://security.paloaltonetworks.com/CVE-2017-3731
https://source.android.com/security/bulletin/pixel/2017-11-01
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us
https://ubuntu.com/security/notices/USN-3181-1
https://www.openssl.org/news/secadv/20170126.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.tenable.com/security/tns-2017-04
openssl CVE-2018-0739 MEDIUM 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.24
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103518
http://www.securityfocus.com/bid/105609
http://www.securitytracker.com/id/1040576
https://access.redhat.com/errata/RHSA-2018:3090
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0367
https://access.redhat.com/errata/RHSA-2019:1711
https://access.redhat.com/errata/RHSA-2019:1712
https://access.redhat.com/security/cve/CVE-2018-0739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9310d45087ae546e27e61ddf8f6367f29848220d
https://linux.oracle.com/cve/CVE-2018-0739.html
https://linux.oracle.com/errata/ELSA-2018-4228.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00033.html
https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/
https://security.gentoo.org/glsa/201811-21
https://security.gentoo.org/glsa/202007-53
https://security.netapp.com/advisory/ntap-20180330-0002/
https://security.netapp.com/advisory/ntap-20180726-0002/
https://securityadvisories.paloaltonetworks.com/Home/Detail/133
https://ubuntu.com/security/notices/USN-3611-1
https://ubuntu.com/security/notices/USN-3611-2
https://usn.ubuntu.com/3611-1/
https://usn.ubuntu.com/3611-2/
https://www.debian.org/security/2018/dsa-4157
https://www.debian.org/security/2018/dsa-4158
https://www.openssl.org/news/secadv/20180327.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-04
https://www.tenable.com/security/tns-2018-06
https://www.tenable.com/security/tns-2018-07
openssl CVE-2016-0702 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.18
Expand...http://cachebleed.info
http://cachebleed.info/
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
http://marc.info/?l=bugtraq&m=145889460330120&w=2
http://openssl.org/news/secadv/20160301.txt
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
http://www.debian.org/security/2016/dsa-3500
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securitytracker.com/id/1035133
http://www.ubuntu.com/usn/USN-2914-1
https://access.redhat.com/security/cve/CVE-2016-0702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702
https://git.openssl.org/?p=openssl.git;a=commit;h=708dc2f1291e104fe4eef810bb8ffc1fae5b19c1
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
https://linux.oracle.com/cve/CVE-2016-0702.html
https://linux.oracle.com/errata/ELSA-2016-0301.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
https://security.gentoo.org/glsa/201603-15
https://ssrg.nicta.com.au/projects/TS/cachebleed/
https://ubuntu.com/security/notices/USN-2914-1
https://www.openssl.org/news/secadv/20160301.txt
openssl CVE-2016-0705 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.18
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
http://marc.info/?l=bugtraq&m=145889460330120&w=2
http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=bugtraq&m=146108058503441&w=2
http://openssl.org/news/secadv/20160301.txt
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://source.android.com/security/bulletin/2016-05-01.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
http://www.debian.org/security/2016/dsa-3500
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/83754
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035133
http://www.ubuntu.com/usn/USN-2914-1
https://access.redhat.com/errata/RHSA-2018:2568
https://access.redhat.com/errata/RHSA-2018:2575
https://access.redhat.com/errata/RHSA-2018:2713
https://access.redhat.com/security/cve/CVE-2016-0705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705
https://git.openssl.org/?p=openssl.git;a=commit;h=6c88c71b4e4825c7bc0489306d062d017634eb88
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
https://linux.oracle.com/cve/CVE-2016-0705.html
https://linux.oracle.com/errata/ELSA-2016-0301.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
https://security.gentoo.org/glsa/201603-15
https://ubuntu.com/security/notices/USN-2914-1
https://www.openssl.org/news/secadv/20160301.txt
openssl CVE-2016-0797 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.18
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
http://marc.info/?l=bugtraq&m=145889460330120&w=2
http://openssl.org/news/secadv/20160301.txt
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
http://www.debian.org/security/2016/dsa-3500
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/83763
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035133
http://www.ubuntu.com/usn/USN-2914-1
https://access.redhat.com/security/cve/CVE-2016-0797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797
https://git.openssl.org/?p=openssl.git;a=commit;h=c175308407858afff3fc8c2e5e085d94d12edc7d
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
https://kc.mcafee.com/corporate/index?page=content&id=SB10156
https://linux.oracle.com/cve/CVE-2016-0797.html
https://linux.oracle.com/errata/ELSA-2016-0302.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
https://security.gentoo.org/glsa/201603-15
https://ubuntu.com/security/notices/USN-2914-1
https://www.openssl.org/news/secadv/20160301.txt
openssl CVE-2016-0798 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.18
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
http://openssl.org/news/secadv/20160301.txt
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
http://www.debian.org/security/2016/dsa-3500
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/83705
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035133
http://www.ubuntu.com/usn/USN-2914-1
https://access.redhat.com/security/cve/CVE-2016-0798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798
https://git.openssl.org/?p=openssl.git;a=commit;h=259b664f950c2ba66fbf4b0fe5281327904ead21
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
https://security.gentoo.org/glsa/201603-15
https://ubuntu.com/security/notices/USN-2914-1
https://www.openssl.org/news/secadv/20160301.txt
openssl CVE-2016-0799 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.18
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=bugtraq&m=146108058503441&w=2
http://openssl.org/news/secadv/20160301.txt
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
http://www.debian.org/security/2016/dsa-3500
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/83755
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035133
http://www.ubuntu.com/usn/USN-2914-1
https://access.redhat.com/security/cve/CVE-2016-0799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799
https://git.openssl.org/?p=openssl.git;a=commit;h=578b956fe741bf8e84055547b1e83c28dd902c73
https://guidovranken.wordpress.com/2016/02/27/openssl-cve-2016-0799-heap-corruption-via-bio_printf/
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
https://linux.oracle.com/cve/CVE-2016-0799.html
https://linux.oracle.com/errata/ELSA-2016-3576.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
https://security.gentoo.org/glsa/201603-15
https://ubuntu.com/security/notices/USN-2914-1
https://www.openssl.org/news/secadv/20160301.txt
openssl CVE-2016-2105 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.19
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-1648.html
http://rhn.redhat.com/errata/RHSA-2016-1649.html
http://rhn.redhat.com/errata/RHSA-2016-1650.html
http://rhn.redhat.com/errata/RHSA-2016-2056.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
http://www.debian.org/security/2016/dsa-3566
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/89757
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035721
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
http://www.ubuntu.com/usn/USN-2959-1
https://access.redhat.com/security/cve/CVE-2016-2105
https://bto.bluecoat.com/security-advisory/sa123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105
https://git.openssl.org/?p=openssl.git;a=commit;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kc.mcafee.com/corporate/index?page=content&id=SB10160
https://linux.oracle.com/cve/CVE-2016-2105.html
https://linux.oracle.com/errata/ELSA-2016-3576.html
https://openssl.org/news/secadv/20160503.txt
https://security.gentoo.org/glsa/201612-16
https://security.netapp.com/advisory/ntap-20160504-0001/
https://source.android.com/security/bulletin/pixel/2017-11-01
https://support.apple.com/HT206903
https://ubuntu.com/security/notices/USN-2959-1
https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
https://www.openssl.org/news/secadv/20160503.txt
https://www.tenable.com/security/tns-2016-18
openssl CVE-2016-2106 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.19
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
http://rhn.redhat.com/errata/RHSA-2016-0722.html
http://rhn.redhat.com/errata/RHSA-2016-0996.html
http://rhn.redhat.com/errata/RHSA-2016-1648.html
http://rhn.redhat.com/errata/RHSA-2016-1649.html
http://rhn.redhat.com/errata/RHSA-2016-1650.html
http://rhn.redhat.com/errata/RHSA-2016-2056.html
http://rhn.redhat.com/errata/RHSA-2016-2073.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
http://www.debian.org/security/2016/dsa-3566
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/89744
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035721
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
http://www.ubuntu.com/usn/USN-2959-1
https://access.redhat.com/security/cve/CVE-2016-2106
https://bto.bluecoat.com/security-advisory/sa123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106
https://git.openssl.org/?p=openssl.git;a=commit;h=3f3582139fbb259a1c3cbb0a25236500a409bf26
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
https://kc.mcafee.com/corporate/index?page=content&id=SB10160
https://linux.oracle.com/cve/CVE-2016-2106.html
https://linux.oracle.com/errata/ELSA-2016-3576.html
https://openssl.org/news/secadv/20160503.txt
https://security.gentoo.org/glsa/201612-16
https://security.netapp.com/advisory/ntap-20160504-0001/
https://source.android.com/security/bulletin/pixel/2017-11-01
https://support.apple.com/HT206903
https://ubuntu.com/security/notices/USN-2959-1
https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
https://www.openssl.org/news/secadv/20160503.txt
https://www.tenable.com/security/tns-2016-18
openssl CVE-2016-2177 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.22
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.openwall.com/lists/oss-security/2016/06/08/9
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/540957/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540957/100/0/threaded
http://www.securityfocus.com/bid/91319
http://www.securitytracker.com/id/1036088
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3181-1
https://access.redhat.com/errata/RHSA-2017:0193
https://access.redhat.com/errata/RHSA-2017:0194
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/security/cve/CVE-2016-2177
https://bto.bluecoat.com/security-advisory/sa132
https://bugzilla.redhat.com/show_bug.cgi?id=1341705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177
https://git.openssl.org/?p=openssl.git;a=commit;h=a004e72b95835136d3f1ea90517f706c24c03da7
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03763en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10165
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://linux.oracle.com/cve/CVE-2016-2177.html
https://linux.oracle.com/errata/ELSA-2016-3627.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://security.gentoo.org/glsa/201612-16
https://support.f5.com/csp/article/K23873366
https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3181-1
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager
https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/
https://www.openssl.org/news/secadv/20160922.txt
https://www.schneider-electric.com/en/download/document/SEVD-2018-137-01/
https://www.schneider-electric.com/en/download/document/SEVD-2018-144-01/
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
openssl CVE-2016-2178 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://eprint.iacr.org/2016/594
http://eprint.iacr.org/2016/594.pdf
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/oss-sec/2016/q2/493
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.openwall.com/lists/oss-security/2016/06/08/10
http://www.openwall.com/lists/oss-security/2016/06/08/11
http://www.openwall.com/lists/oss-security/2016/06/08/12
http://www.openwall.com/lists/oss-security/2016/06/08/2
http://www.openwall.com/lists/oss-security/2016/06/08/4
http://www.openwall.com/lists/oss-security/2016/06/08/5
http://www.openwall.com/lists/oss-security/2016/06/08/6
http://www.openwall.com/lists/oss-security/2016/06/08/7
http://www.openwall.com/lists/oss-security/2016/06/08/8
http://www.openwall.com/lists/oss-security/2016/06/09/2
http://www.openwall.com/lists/oss-security/2016/06/09/8
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/91081
http://www.securitytracker.com/id/1036054
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
https://access.redhat.com/errata/RHSA-2017:0193
https://access.redhat.com/errata/RHSA-2017:0194
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/security/cve/CVE-2016-2178
https://bto.bluecoat.com/security-advisory/sa132
https://bugzilla.redhat.com/show_bug.cgi?id=1343400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178
https://git.openssl.org/?p=openssl.git;a=commit;h=399944622df7bd81af62e67ea967c470534090e2
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://linux.oracle.com/cve/CVE-2016-2178.html
https://linux.oracle.com/errata/ELSA-2016-3627.html
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://security.gentoo.org/glsa/201612-16
https://support.f5.com/csp/article/K53084033
https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://ubuntu.com/security/notices/USN-3087-1
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.openssl.org/news/secadv/20160922.txt
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
openssl CVE-2016-2179 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/92987
http://www.securitytracker.com/id/1036689
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-2179
https://bto.bluecoat.com/security-advisory/sa132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179
https://git.openssl.org/?p=openssl.git;a=commit;h=f5c7f5dfbaf0d2f7d946d0fe86f08e6bcb36ed0d
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://linux.oracle.com/cve/CVE-2016-2179.html
https://linux.oracle.com/errata/ELSA-2016-3621.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://ubuntu.com/security/notices/USN-3087-1
https://www.openssl.org/news/secadv/20160922.txt
https://www.openssl.org/news/vulnerabilities.html#y2017
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
openssl CVE-2016-2180 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/92117
http://www.securitytracker.com/id/1036486
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-2180
https://bto.bluecoat.com/security-advisory/sa132
https://bugzilla.redhat.com/show_bug.cgi?id=1359615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180
https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://linux.oracle.com/cve/CVE-2016-2180.html
https://linux.oracle.com/errata/ELSA-2016-3621.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://security.gentoo.org/glsa/201612-16
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://ubuntu.com/security/notices/USN-3087-1
https://www.openssl.org/news/secadv/20160922.txt
https://www.openssl.org/news/vulnerabilities.html#y2017
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
openssl CVE-2016-2181 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/92982
http://www.securitytracker.com/id/1036690
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
https://access.redhat.com/security/cve/CVE-2016-2181
https://bto.bluecoat.com/security-advisory/sa132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181
https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://linux.oracle.com/cve/CVE-2016-2181.html
https://linux.oracle.com/errata/ELSA-2016-3621.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://support.f5.com/csp/article/K59298921
https://ubuntu.com/security/notices/USN-3087-1
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.openssl.org/news/secadv/20160922.txt
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
openssl CVE-2016-2182 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/92557
http://www.securitytracker.com/id/1036688
http://www.securitytracker.com/id/1037968
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
https://access.redhat.com/security/cve/CVE-2016-2182
https://bto.bluecoat.com/security-advisory/sa132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182
https://git.openssl.org/?p=openssl.git;a=commit;h=07bed46f332fce8c1d157689a2cdf915a982ae34
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://linux.oracle.com/cve/CVE-2016-2182.html
https://linux.oracle.com/errata/ELSA-2016-3627.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://source.android.com/security/bulletin/2017-03-01
https://source.android.com/security/bulletin/2017-03-01.html
https://support.f5.com/csp/article/K01276005
https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3087-2
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.openssl.org/news/secadv/20160922.txt
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
openssl CVE-2016-2183 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://rhn.redhat.com/errata/RHSA-2017-0462.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/fulldisclosure/2017/May/105
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/542005/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
http://www.securityfocus.com/bid/92630
http://www.securityfocus.com/bid/95568
http://www.securitytracker.com/id/1036696
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3179-1
http://www.ubuntu.com/usn/USN-3194-1
http://www.ubuntu.com/usn/USN-3198-1
http://www.ubuntu.com/usn/USN-3270-1
http://www.ubuntu.com/usn/USN-3372-1
https://access.redhat.com/articles/2548661
https://access.redhat.com/errata/RHSA-2016:1940
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2018:2123
https://access.redhat.com/errata/RHSA-2019:1245
https://access.redhat.com/errata/RHSA-2019:2859
https://access.redhat.com/errata/RHSA-2020:0451
https://access.redhat.com/security/cve/CVE-2016-2183
https://access.redhat.com/security/cve/cve-2016-2183
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
https://bto.bluecoat.com/security-advisory/sa133
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
https://community.qualys.com/thread/16555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
https://linux.oracle.com/cve/CVE-2016-2183.html
https://linux.oracle.com/errata/ELSA-2018-2123.html
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
https://seclists.org/bugtraq/2018/Nov/21
https://security-tracker.debian.org/tracker/CVE-2016-2183
https://security.gentoo.org/glsa/201612-16
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20160915-0001/
https://security.netapp.com/advisory/ntap-20170119-0001/
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
https://support.f5.com/csp/article/K13167034
https://sweet32.info/
https://twitter.com/symantec/status/768786631159603200
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://ubuntu.com/security/notices/USN-3270-1
https://ubuntu.com/security/notices/USN-3372-1
https://wiki.opendaylight.org/view/Security_Advisories
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.exploit-db.com/exploits/42091/
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
https://www.tenable.com/security/tns-2017-09
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
openssl CVE-2016-6302 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.20
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://rhn.redhat.com/errata/RHSA-2016-1940.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/92628
http://www.securitytracker.com/id/1036885
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
https://access.redhat.com/security/cve/CVE-2016-6302
https://bto.bluecoat.com/security-advisory/sa132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://linux.oracle.com/cve/CVE-2016-6302.html
https://linux.oracle.com/errata/ELSA-2016-3621.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
https://ubuntu.com/security/notices/USN-3087-1
https://www.openssl.org/news/secadv/20160922.txt
https://www.openssl.org/news/vulnerabilities.html#y2017
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
openssl CVE-2016-8610 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.22
Expand...http://rhn.redhat.com/errata/RHSA-2017-0286.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/oss-sec/2016/q4/224
http://security.360.cn/cve/CVE-2016-8610
http://security.360.cn/cve/CVE-2016-8610/
http://www.openwall.com/lists/oss-security/2016/10/24/3
http://www.securityfocus.com/bid/93841
http://www.securitytracker.com/id/1037084
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/security/cve/CVE-2016-8610
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401
https://linux.oracle.com/cve/CVE-2016-8610.html
https://linux.oracle.com/errata/ELSA-2017-0574.html
https://security.360.cn/cve/CVE-2016-8610/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc
https://security.netapp.com/advisory/ntap-20171130-0001/
https://security.paloaltonetworks.com/CVE-2016-8610
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us
https://ubuntu.com/security/notices/USN-3181-1
https://ubuntu.com/security/notices/USN-3183-1
https://ubuntu.com/security/notices/USN-3183-2
https://www.debian.org/security/2017/dsa-3773
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
openssl CVE-2017-3735 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.23
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/100515
http://www.securitytracker.com/id/1039726
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/security/cve/CVE-2017-3735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735
https://github.com/openssl/openssl/commit/068b963bb7afc57f5bdd723de0dd15e7795d5822
https://linux.oracle.com/cve/CVE-2017-3735.html
https://linux.oracle.com/errata/ELSA-2018-4187.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00011.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc
https://security.gentoo.org/glsa/201712-03
https://security.netapp.com/advisory/ntap-20170927-0001/
https://security.netapp.com/advisory/ntap-20171107-0002/
https://support.apple.com/HT208331
https://ubuntu.com/security/notices/USN-3475-1
https://ubuntu.com/security/notices/USN-3611-2
https://usn.ubuntu.com/3611-2/
https://www.debian.org/security/2017/dsa-4017
https://www.debian.org/security/2017/dsa-4018
https://www.openssl.org/news/secadv/20170828.txt
https://www.openssl.org/news/secadv/20171102.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2017-14
https://www.tenable.com/security/tns-2017-15
openssl CVE-2018-0495 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.26
Expand...http://www.securitytracker.com/id/1041144
http://www.securitytracker.com/id/1041147
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1296
https://access.redhat.com/errata/RHSA-2019:1297
https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/errata/RHSA-2019:2237
https://access.redhat.com/security/cve/CVE-2018-0495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495
https://dev.gnupg.org/T4011
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.38_release_notes
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965
https://linux.oracle.com/cve/CVE-2018-0495.html
https://linux.oracle.com/errata/ELSA-2019-2237.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
https://ubuntu.com/security/notices/USN-3689-1
https://ubuntu.com/security/notices/USN-3689-2
https://ubuntu.com/security/notices/USN-3692-1
https://ubuntu.com/security/notices/USN-3692-2
https://ubuntu.com/security/notices/USN-3850-1
https://ubuntu.com/security/notices/USN-3850-2
https://usn.ubuntu.com/3689-1/
https://usn.ubuntu.com/3689-2/
https://usn.ubuntu.com/3692-1/
https://usn.ubuntu.com/3692-2/
https://usn.ubuntu.com/3850-1/
https://usn.ubuntu.com/3850-2/
https://www.debian.org/security/2018/dsa-4231
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
openssl CVE-2018-0732 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.26
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104442
http://www.securitytracker.com/id/1041090
https://access.redhat.com/errata/RHSA-2018:2552
https://access.redhat.com/errata/RHSA-2018:2553
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1296
https://access.redhat.com/errata/RHSA-2019:1297
https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/security/cve/CVE-2018-0732
https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4
https://linux.oracle.com/cve/CVE-2018-0732.html
https://linux.oracle.com/errata/ELSA-2018-4249.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
https://security.gentoo.org/glsa/201811-03
https://security.netapp.com/advisory/ntap-20181105-0001/
https://security.netapp.com/advisory/ntap-20190118-0002/
https://securityadvisories.paloaltonetworks.com/Home/Detail/133
https://ubuntu.com/security/notices/USN-3692-1
https://ubuntu.com/security/notices/USN-3692-2
https://usn.ubuntu.com/3692-1/
https://usn.ubuntu.com/3692-2/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.openssl.org/news/secadv/20180612.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2018-12
https://www.tenable.com/security/tns-2018-13
https://www.tenable.com/security/tns-2018-14
https://www.tenable.com/security/tns-2018-17
openssl CVE-2018-0734 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
http://www.securityfocus.com/bid/105758
https://access.redhat.com/errata/RHSA-2019:2304
https://access.redhat.com/errata/RHSA-2019:3700
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/security/cve/CVE-2018-0734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=43e6a58d4991a451daf4891ff05a48735df871ac
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7
https://linux.oracle.com/cve/CVE-2018-0734.html
https://linux.oracle.com/errata/ELSA-2019-3700.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
https://nvd.nist.gov/vuln/detail/CVE-2018-0734
https://security.netapp.com/advisory/ntap-20181105-0002/
https://security.netapp.com/advisory/ntap-20190118-0002/
https://security.netapp.com/advisory/ntap-20190423-0002/
https://ubuntu.com/security/notices/USN-3840-1
https://usn.ubuntu.com/3840-1/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.openssl.org/news/secadv/20181030.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-16
https://www.tenable.com/security/tns-2018-17
openssl CVE-2018-0737 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.26
Expand...http://www.openwall.com/lists/oss-security/2018/04/16/3
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103766
http://www.securitytracker.com/id/1040685
https://access.redhat.com/errata/RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/security/cve/CVE-2018-0737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787
https://linux.oracle.com/cve/CVE-2018-0737.html
https://linux.oracle.com/errata/ELSA-2018-4249.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
https://security.gentoo.org/glsa/201811-21
https://security.netapp.com/advisory/ntap-20180726-0003/
https://securityadvisories.paloaltonetworks.com/Home/Detail/133
https://ubuntu.com/security/notices/USN-3628-1
https://ubuntu.com/security/notices/USN-3628-2
https://ubuntu.com/security/notices/USN-3692-1
https://ubuntu.com/security/notices/USN-3692-2
https://usn.ubuntu.com/3628-1/
https://usn.ubuntu.com/3628-2/
https://usn.ubuntu.com/3692-1/
https://usn.ubuntu.com/3692-2/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.openssl.org/news/secadv/20180416.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-12
https://www.tenable.com/security/tns-2018-13
https://www.tenable.com/security/tns-2018-14
https://www.tenable.com/security/tns-2018-17
openssl CVE-2018-5407 LOW 1.0.1f-1ubuntu2.16 1.0.1f-1ubuntu2.27
Expand...http://www.securityfocus.com/bid/105897
https://access.redhat.com/errata/RHSA-2019:0483
https://access.redhat.com/errata/RHSA-2019:0651
https://access.redhat.com/errata/RHSA-2019:0652
https://access.redhat.com/errata/RHSA-2019:2125
https://access.redhat.com/errata/RHSA-2019:3929
https://access.redhat.com/errata/RHSA-2019:3931
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/security/cve/CVE-2018-5407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407
https://eprint.iacr.org/2018/1060.pdf
https://github.com/bbbrumley/portsmash
https://linux.oracle.com/cve/CVE-2018-5407.html
https://linux.oracle.com/errata/ELSA-2019-2125.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
https://security.gentoo.org/glsa/201903-10
https://security.netapp.com/advisory/ntap-20181126-0001/
https://support.f5.com/csp/article/K49711130?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3840-1
https://usn.ubuntu.com/3840-1/
https://www.debian.org/security/2018/dsa-4348
https://www.debian.org/security/2018/dsa-4355
https://www.exploit-db.com/exploits/45785/
https://www.openssl.org/news/secadv/20181112.txt
https://www.openwall.com/lists/oss-security/2018/11/01/4
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2018-16
https://www.tenable.com/security/tns-2018-17
passwd CVE-2016-6252 MEDIUM 1:4.1.5.1-1ubuntu9.1 1:4.1.5.1-1ubuntu9.4
Expand...http://www.debian.org/security/2017/dsa-3793
http://www.openwall.com/lists/oss-security/2016/07/19/6
http://www.openwall.com/lists/oss-security/2016/07/19/7
http://www.openwall.com/lists/oss-security/2016/07/20/2
http://www.openwall.com/lists/oss-security/2016/07/25/7
http://www.securityfocus.com/bid/92055
https://access.redhat.com/security/cve/CVE-2016-6252
https://bugzilla.suse.com/show_bug.cgi?id=979282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252
https://github.com/shadow-maint/shadow/issues/27
https://security.gentoo.org/glsa/201706-02
https://ubuntu.com/security/notices/USN-3276-1
passwd CVE-2017-2616 MEDIUM 1:4.1.5.1-1ubuntu9.1 1:4.1.5.1-1ubuntu9.4
Expand...http://rhn.redhat.com/errata/RHSA-2017-0654.html
http://www.securityfocus.com/bid/96404
http://www.securitytracker.com/id/1038271
https://access.redhat.com/errata/RHSA-2017:0907
https://access.redhat.com/security/cve/CVE-2017-2616
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616
https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891
https://linux.oracle.com/cve/CVE-2017-2616.html
https://linux.oracle.com/errata/ELSA-2017-0907.html
https://security.gentoo.org/glsa/201706-02
https://ubuntu.com/security/notices/USN-3276-1
https://ubuntu.com/security/notices/USN-3276-3
https://www.debian.org/security/2017/dsa-3793
patch CVE-2018-1000156 MEDIUM 2.7.1-4ubuntu2.3 2.7.1-4ubuntu2.4
Expand...http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
http://rachelbythebay.com/w/2018/04/05/bangpatch/
https://access.redhat.com/errata/RHSA-2018:1199
https://access.redhat.com/errata/RHSA-2018:1200
https://access.redhat.com/errata/RHSA-2018:2091
https://access.redhat.com/errata/RHSA-2018:2092
https://access.redhat.com/errata/RHSA-2018:2093
https://access.redhat.com/errata/RHSA-2018:2094
https://access.redhat.com/errata/RHSA-2018:2095
https://access.redhat.com/errata/RHSA-2018:2096
https://access.redhat.com/errata/RHSA-2018:2097
https://access.redhat.com/security/cve/CVE-2018-1000156
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156
https://linux.oracle.com/cve/CVE-2018-1000156.html
https://linux.oracle.com/errata/ELSA-2018-1200.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1000156
https://rachelbythebay.com/w/2018/04/05/bangpatch/
https://savannah.gnu.org/bugs/index.php?53566
https://seclists.org/bugtraq/2019/Aug/29
https://seclists.org/bugtraq/2019/Jul/54
https://security.gentoo.org/glsa/201904-17
https://twitter.com/kurtseifried/status/982028968877436928
https://ubuntu.com/security/notices/USN-3624-1
https://ubuntu.com/security/notices/USN-3624-2
https://usn.ubuntu.com/3624-1/
https://usn.ubuntu.com/3624-2/
patch CVE-2016-10713 LOW 2.7.1-4ubuntu2.3 2.7.1-4ubuntu2.4
Expand...http://www.securityfocus.com/bid/103063
https://access.redhat.com/errata/RHSA-2019:2033
https://access.redhat.com/security/cve/CVE-2016-10713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10713
https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866
https://linux.oracle.com/cve/CVE-2016-10713.html
https://linux.oracle.com/errata/ELSA-2019-2033.html
https://savannah.gnu.org/bugs/index.php?45990
https://ubuntu.com/security/notices/USN-3624-1
https://ubuntu.com/security/notices/USN-3624-2
https://usn.ubuntu.com/3624-1/
https://usn.ubuntu.com/3624-2/
patch CVE-2018-6951 LOW 2.7.1-4ubuntu2.3 2.7.1-4ubuntu2.4
Expand...http://www.securityfocus.com/bid/103044
https://access.redhat.com/security/cve/CVE-2018-6951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
https://nvd.nist.gov/vuln/detail/CVE-2018-6951
https://savannah.gnu.org/bugs/index.php?53132
https://security.gentoo.org/glsa/201904-17
https://ubuntu.com/security/notices/USN-3624-1
https://usn.ubuntu.com/3624-1/
perl CVE-2016-2381 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
perl CVE-2017-12837 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.3
Expand...http://www.debian.org/security/2017/dsa-3982
http://www.securityfocus.com/bid/100860
https://access.redhat.com/security/cve/CVE-2017-12837
https://bugzilla.redhat.com/show_bug.cgi?id=1492091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837
https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1
https://rt.perl.org/Public/Bug/Display.html?id=131582
https://rt.perl.org/Public/Bug/Display.html?id=131582 (not yet public)
https://security.netapp.com/advisory/ntap-20180426-0001/
https://ubuntu.com/security/notices/USN-3478-1
https://www.oracle.com/security-alerts/cpujul2020.html
perl CVE-2017-12883 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.3
Expand...http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch
http://www.debian.org/security/2017/dsa-3982
http://www.securityfocus.com/bid/100852
https://access.redhat.com/security/cve/CVE-2017-12883
https://bugzilla.redhat.com/show_bug.cgi?id=1492093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883
https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1
https://rt.perl.org/Public/Bug/Display.html?id=131598
https://security.netapp.com/advisory/ntap-20180426-0001/
https://ubuntu.com/security/notices/USN-3478-1
https://ubuntu.com/security/notices/USN-3478-2
https://www.oracle.com/security-alerts/cpujul2020.html
perl CVE-2018-12015 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.6
Expand...http://seclists.org/fulldisclosure/2019/Mar/49
http://www.securityfocus.com/bid/104423
http://www.securitytracker.com/id/1041048
https://access.redhat.com/errata/RHSA-2019:2097
https://access.redhat.com/security/cve/CVE-2018-12015
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015
https://linux.oracle.com/cve/CVE-2018-12015.html
https://linux.oracle.com/errata/ELSA-2019-2097.html
https://seclists.org/bugtraq/2019/Mar/42
https://security.netapp.com/advisory/ntap-20180927-0001/
https://support.apple.com/kb/HT209600
https://ubuntu.com/security/notices/USN-3684-1
https://ubuntu.com/security/notices/USN-3684-2
https://usn.ubuntu.com/3684-1/
https://usn.ubuntu.com/3684-2/
https://www.debian.org/security/2018/dsa-4226
https://www.oracle.com/security-alerts/cpujul2020.html
perl CVE-2018-18311 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.7
Expand...http://seclists.org/fulldisclosure/2019/Mar/49
http://www.securityfocus.com/bid/106145
http://www.securitytracker.com/id/1042181
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2019:0001
https://access.redhat.com/errata/RHSA-2019:0010
https://access.redhat.com/errata/RHSA-2019:0109
https://access.redhat.com/errata/RHSA-2019:1790
https://access.redhat.com/errata/RHSA-2019:1942
https://access.redhat.com/errata/RHSA-2019:2400
https://access.redhat.com/security/cve/CVE-2018-18311
https://bugzilla.redhat.com/show_bug.cgi?id=1646730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311
https://github.com/Perl/perl5/commit/34716e2a6ee2af96078d62b065b7785c001194be
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2018-18311.html
https://linux.oracle.com/errata/ELSA-2019-0109.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00039.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
https://metacpan.org/changes/release/SHAY/perl-5.26.3
https://metacpan.org/changes/release/SHAY/perl-5.28.1
https://rt.perl.org/Ticket/Display.html?id=133204
https://seclists.org/bugtraq/2019/Mar/42
https://security.gentoo.org/glsa/201909-01
https://security.netapp.com/advisory/ntap-20190221-0003/
https://support.apple.com/kb/HT209600
https://ubuntu.com/security/notices/USN-3834-1
https://ubuntu.com/security/notices/USN-3834-2
https://usn.ubuntu.com/3834-1/
https://usn.ubuntu.com/3834-2/
https://www.debian.org/security/2018/dsa-4347
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
perl CVE-2018-18313 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.7
Expand...http://seclists.org/fulldisclosure/2019/Mar/49
http://www.securitytracker.com/id/1042181
https://access.redhat.com/errata/RHSA-2019:0001
https://access.redhat.com/errata/RHSA-2019:0010
https://access.redhat.com/security/cve/CVE-2018-18313
https://bugzilla.redhat.com/show_bug.cgi?id=1646738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313
https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
https://metacpan.org/changes/release/SHAY/perl-5.26.3
https://rt.perl.org/Ticket/Display.html?id=133192
https://seclists.org/bugtraq/2019/Mar/42
https://security.gentoo.org/glsa/201909-01
https://security.netapp.com/advisory/ntap-20190221-0003/
https://support.apple.com/kb/HT209600
https://ubuntu.com/security/notices/USN-3834-1
https://ubuntu.com/security/notices/USN-3834-2
https://usn.ubuntu.com/3834-1/
https://usn.ubuntu.com/3834-2/
https://www.debian.org/security/2018/dsa-4347
https://www.oracle.com/security-alerts/cpujul2020.html
perl CVE-2018-6913 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.4
Expand...http://www.securityfocus.com/bid/103953
http://www.securitytracker.com/id/1040681
https://access.redhat.com/security/cve/CVE-2018-6913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913
https://lists.debian.org/debian-lts-announce/2018/04/msg00009.html
https://rt.perl.org/Public/Bug/Display.html?id=131844
https://security.gentoo.org/glsa/201909-01
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
https://www.debian.org/security/2018/dsa-4172
https://www.oracle.com/security-alerts/cpujul2020.html
perl CVE-2013-7422 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.1
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
perl CVE-2014-4330 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.1
Expand...http://advisories.mageia.org/MGASA-2014-0406.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html
http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html
http://seclists.org/fulldisclosure/2014/Sep/84
http://seclists.org/oss-sec/2014/q3/692
http://secunia.com/advisories/61441
http://secunia.com/advisories/61961
http://www.mandriva.com/security/advisories?name=MDVSA-2015:136
http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html
http://www.securityfocus.com/archive/1/533543/100/0/threaded
http://www.securityfocus.com/bid/70142
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2014-4330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330
https://exchange.xforce.ibmcloud.com/vulnerabilities/96216
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://metacpan.org/pod/distribution/Data-Dumper/Changes
https://ubuntu.com/security/notices/USN-2916-1
https://www.lsexperts.de/advisories/lse-2014-06-10.txt
perl CVE-2015-8853 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.4
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl CVE-2016-6185 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.4
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl CVE-2017-6512 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.4
Expand...http://cpansearch.perl.org/src/JKEENAN/File-Path-2.13/Changes
http://security.cucumberlinux.com/security/details.php?id=153
http://www.debian.org/security/2017/dsa-3873
http://www.securityfocus.com/bid/99180
http://www.securitytracker.com/id/1038610
https://access.redhat.com/security/cve/CVE-2017-6512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512
https://rt.cpan.org/Ticket/Display.html?id=121951
https://security.gentoo.org/glsa/201709-12
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl-base CVE-2016-2381 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
perl-base CVE-2017-12837 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.3
Expand...http://www.debian.org/security/2017/dsa-3982
http://www.securityfocus.com/bid/100860
https://access.redhat.com/security/cve/CVE-2017-12837
https://bugzilla.redhat.com/show_bug.cgi?id=1492091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837
https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1
https://rt.perl.org/Public/Bug/Display.html?id=131582
https://rt.perl.org/Public/Bug/Display.html?id=131582 (not yet public)
https://security.netapp.com/advisory/ntap-20180426-0001/
https://ubuntu.com/security/notices/USN-3478-1
https://www.oracle.com/security-alerts/cpujul2020.html
perl-base CVE-2017-12883 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.3
Expand...http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch
http://www.debian.org/security/2017/dsa-3982
http://www.securityfocus.com/bid/100852
https://access.redhat.com/security/cve/CVE-2017-12883
https://bugzilla.redhat.com/show_bug.cgi?id=1492093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883
https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1
https://rt.perl.org/Public/Bug/Display.html?id=131598
https://security.netapp.com/advisory/ntap-20180426-0001/
https://ubuntu.com/security/notices/USN-3478-1
https://ubuntu.com/security/notices/USN-3478-2
https://www.oracle.com/security-alerts/cpujul2020.html
perl-base CVE-2018-12015 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.6
Expand...http://seclists.org/fulldisclosure/2019/Mar/49
http://www.securityfocus.com/bid/104423
http://www.securitytracker.com/id/1041048
https://access.redhat.com/errata/RHSA-2019:2097
https://access.redhat.com/security/cve/CVE-2018-12015
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015
https://linux.oracle.com/cve/CVE-2018-12015.html
https://linux.oracle.com/errata/ELSA-2019-2097.html
https://seclists.org/bugtraq/2019/Mar/42
https://security.netapp.com/advisory/ntap-20180927-0001/
https://support.apple.com/kb/HT209600
https://ubuntu.com/security/notices/USN-3684-1
https://ubuntu.com/security/notices/USN-3684-2
https://usn.ubuntu.com/3684-1/
https://usn.ubuntu.com/3684-2/
https://www.debian.org/security/2018/dsa-4226
https://www.oracle.com/security-alerts/cpujul2020.html
perl-base CVE-2018-18311 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.7
Expand...http://seclists.org/fulldisclosure/2019/Mar/49
http://www.securityfocus.com/bid/106145
http://www.securitytracker.com/id/1042181
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2019:0001
https://access.redhat.com/errata/RHSA-2019:0010
https://access.redhat.com/errata/RHSA-2019:0109
https://access.redhat.com/errata/RHSA-2019:1790
https://access.redhat.com/errata/RHSA-2019:1942
https://access.redhat.com/errata/RHSA-2019:2400
https://access.redhat.com/security/cve/CVE-2018-18311
https://bugzilla.redhat.com/show_bug.cgi?id=1646730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311
https://github.com/Perl/perl5/commit/34716e2a6ee2af96078d62b065b7785c001194be
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2018-18311.html
https://linux.oracle.com/errata/ELSA-2019-0109.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00039.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
https://metacpan.org/changes/release/SHAY/perl-5.26.3
https://metacpan.org/changes/release/SHAY/perl-5.28.1
https://rt.perl.org/Ticket/Display.html?id=133204
https://seclists.org/bugtraq/2019/Mar/42
https://security.gentoo.org/glsa/201909-01
https://security.netapp.com/advisory/ntap-20190221-0003/
https://support.apple.com/kb/HT209600
https://ubuntu.com/security/notices/USN-3834-1
https://ubuntu.com/security/notices/USN-3834-2
https://usn.ubuntu.com/3834-1/
https://usn.ubuntu.com/3834-2/
https://www.debian.org/security/2018/dsa-4347
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
perl-base CVE-2018-18313 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.7
Expand...http://seclists.org/fulldisclosure/2019/Mar/49
http://www.securitytracker.com/id/1042181
https://access.redhat.com/errata/RHSA-2019:0001
https://access.redhat.com/errata/RHSA-2019:0010
https://access.redhat.com/security/cve/CVE-2018-18313
https://bugzilla.redhat.com/show_bug.cgi?id=1646738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313
https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
https://metacpan.org/changes/release/SHAY/perl-5.26.3
https://rt.perl.org/Ticket/Display.html?id=133192
https://seclists.org/bugtraq/2019/Mar/42
https://security.gentoo.org/glsa/201909-01
https://security.netapp.com/advisory/ntap-20190221-0003/
https://support.apple.com/kb/HT209600
https://ubuntu.com/security/notices/USN-3834-1
https://ubuntu.com/security/notices/USN-3834-2
https://usn.ubuntu.com/3834-1/
https://usn.ubuntu.com/3834-2/
https://www.debian.org/security/2018/dsa-4347
https://www.oracle.com/security-alerts/cpujul2020.html
perl-base CVE-2018-6913 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.4
Expand...http://www.securityfocus.com/bid/103953
http://www.securitytracker.com/id/1040681
https://access.redhat.com/security/cve/CVE-2018-6913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913
https://lists.debian.org/debian-lts-announce/2018/04/msg00009.html
https://rt.perl.org/Public/Bug/Display.html?id=131844
https://security.gentoo.org/glsa/201909-01
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
https://www.debian.org/security/2018/dsa-4172
https://www.oracle.com/security-alerts/cpujul2020.html
perl-base CVE-2013-7422 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.1
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
perl-base CVE-2014-4330 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.1
Expand...http://advisories.mageia.org/MGASA-2014-0406.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html
http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html
http://seclists.org/fulldisclosure/2014/Sep/84
http://seclists.org/oss-sec/2014/q3/692
http://secunia.com/advisories/61441
http://secunia.com/advisories/61961
http://www.mandriva.com/security/advisories?name=MDVSA-2015:136
http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html
http://www.securityfocus.com/archive/1/533543/100/0/threaded
http://www.securityfocus.com/bid/70142
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2014-4330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330
https://exchange.xforce.ibmcloud.com/vulnerabilities/96216
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://metacpan.org/pod/distribution/Data-Dumper/Changes
https://ubuntu.com/security/notices/USN-2916-1
https://www.lsexperts.de/advisories/lse-2014-06-10.txt
perl-base CVE-2015-8853 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.4
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl-base CVE-2016-6185 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.4
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl-base CVE-2017-6512 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.4
Expand...http://cpansearch.perl.org/src/JKEENAN/File-Path-2.13/Changes
http://security.cucumberlinux.com/security/details.php?id=153
http://www.debian.org/security/2017/dsa-3873
http://www.securityfocus.com/bid/99180
http://www.securitytracker.com/id/1038610
https://access.redhat.com/security/cve/CVE-2017-6512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512
https://rt.cpan.org/Ticket/Display.html?id=121951
https://security.gentoo.org/glsa/201709-12
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl-modules CVE-2016-2381 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.1
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
perl-modules CVE-2017-12837 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.3
Expand...http://www.debian.org/security/2017/dsa-3982
http://www.securityfocus.com/bid/100860
https://access.redhat.com/security/cve/CVE-2017-12837
https://bugzilla.redhat.com/show_bug.cgi?id=1492091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837
https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1
https://rt.perl.org/Public/Bug/Display.html?id=131582
https://rt.perl.org/Public/Bug/Display.html?id=131582 (not yet public)
https://security.netapp.com/advisory/ntap-20180426-0001/
https://ubuntu.com/security/notices/USN-3478-1
https://www.oracle.com/security-alerts/cpujul2020.html
perl-modules CVE-2017-12883 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.3
Expand...http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch
http://www.debian.org/security/2017/dsa-3982
http://www.securityfocus.com/bid/100852
https://access.redhat.com/security/cve/CVE-2017-12883
https://bugzilla.redhat.com/show_bug.cgi?id=1492093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883
https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1
https://rt.perl.org/Public/Bug/Display.html?id=131598
https://security.netapp.com/advisory/ntap-20180426-0001/
https://ubuntu.com/security/notices/USN-3478-1
https://ubuntu.com/security/notices/USN-3478-2
https://www.oracle.com/security-alerts/cpujul2020.html
perl-modules CVE-2018-12015 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.6
Expand...http://seclists.org/fulldisclosure/2019/Mar/49
http://www.securityfocus.com/bid/104423
http://www.securitytracker.com/id/1041048
https://access.redhat.com/errata/RHSA-2019:2097
https://access.redhat.com/security/cve/CVE-2018-12015
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015
https://linux.oracle.com/cve/CVE-2018-12015.html
https://linux.oracle.com/errata/ELSA-2019-2097.html
https://seclists.org/bugtraq/2019/Mar/42
https://security.netapp.com/advisory/ntap-20180927-0001/
https://support.apple.com/kb/HT209600
https://ubuntu.com/security/notices/USN-3684-1
https://ubuntu.com/security/notices/USN-3684-2
https://usn.ubuntu.com/3684-1/
https://usn.ubuntu.com/3684-2/
https://www.debian.org/security/2018/dsa-4226
https://www.oracle.com/security-alerts/cpujul2020.html
perl-modules CVE-2018-18311 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.7
Expand...http://seclists.org/fulldisclosure/2019/Mar/49
http://www.securityfocus.com/bid/106145
http://www.securitytracker.com/id/1042181
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2019:0001
https://access.redhat.com/errata/RHSA-2019:0010
https://access.redhat.com/errata/RHSA-2019:0109
https://access.redhat.com/errata/RHSA-2019:1790
https://access.redhat.com/errata/RHSA-2019:1942
https://access.redhat.com/errata/RHSA-2019:2400
https://access.redhat.com/security/cve/CVE-2018-18311
https://bugzilla.redhat.com/show_bug.cgi?id=1646730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311
https://github.com/Perl/perl5/commit/34716e2a6ee2af96078d62b065b7785c001194be
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2018-18311.html
https://linux.oracle.com/errata/ELSA-2019-0109.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00039.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
https://metacpan.org/changes/release/SHAY/perl-5.26.3
https://metacpan.org/changes/release/SHAY/perl-5.28.1
https://rt.perl.org/Ticket/Display.html?id=133204
https://seclists.org/bugtraq/2019/Mar/42
https://security.gentoo.org/glsa/201909-01
https://security.netapp.com/advisory/ntap-20190221-0003/
https://support.apple.com/kb/HT209600
https://ubuntu.com/security/notices/USN-3834-1
https://ubuntu.com/security/notices/USN-3834-2
https://usn.ubuntu.com/3834-1/
https://usn.ubuntu.com/3834-2/
https://www.debian.org/security/2018/dsa-4347
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
perl-modules CVE-2018-18313 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.7
Expand...http://seclists.org/fulldisclosure/2019/Mar/49
http://www.securitytracker.com/id/1042181
https://access.redhat.com/errata/RHSA-2019:0001
https://access.redhat.com/errata/RHSA-2019:0010
https://access.redhat.com/security/cve/CVE-2018-18313
https://bugzilla.redhat.com/show_bug.cgi?id=1646738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313
https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
https://metacpan.org/changes/release/SHAY/perl-5.26.3
https://rt.perl.org/Ticket/Display.html?id=133192
https://seclists.org/bugtraq/2019/Mar/42
https://security.gentoo.org/glsa/201909-01
https://security.netapp.com/advisory/ntap-20190221-0003/
https://support.apple.com/kb/HT209600
https://ubuntu.com/security/notices/USN-3834-1
https://ubuntu.com/security/notices/USN-3834-2
https://usn.ubuntu.com/3834-1/
https://usn.ubuntu.com/3834-2/
https://www.debian.org/security/2018/dsa-4347
https://www.oracle.com/security-alerts/cpujul2020.html
perl-modules CVE-2018-6913 MEDIUM 5.18.2-2ubuntu1 5.18.2-2ubuntu1.4
Expand...http://www.securityfocus.com/bid/103953
http://www.securitytracker.com/id/1040681
https://access.redhat.com/security/cve/CVE-2018-6913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913
https://lists.debian.org/debian-lts-announce/2018/04/msg00009.html
https://rt.perl.org/Public/Bug/Display.html?id=131844
https://security.gentoo.org/glsa/201909-01
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
https://www.debian.org/security/2018/dsa-4172
https://www.oracle.com/security-alerts/cpujul2020.html
perl-modules CVE-2013-7422 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.1
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
perl-modules CVE-2014-4330 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.1
Expand...http://advisories.mageia.org/MGASA-2014-0406.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html
http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html
http://seclists.org/fulldisclosure/2014/Sep/84
http://seclists.org/oss-sec/2014/q3/692
http://secunia.com/advisories/61441
http://secunia.com/advisories/61961
http://www.mandriva.com/security/advisories?name=MDVSA-2015:136
http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html
http://www.securityfocus.com/archive/1/533543/100/0/threaded
http://www.securityfocus.com/bid/70142
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2014-4330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330
https://exchange.xforce.ibmcloud.com/vulnerabilities/96216
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://metacpan.org/pod/distribution/Data-Dumper/Changes
https://ubuntu.com/security/notices/USN-2916-1
https://www.lsexperts.de/advisories/lse-2014-06-10.txt
perl-modules CVE-2015-8853 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.4
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl-modules CVE-2016-6185 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.4
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl-modules CVE-2017-6512 LOW 5.18.2-2ubuntu1 5.18.2-2ubuntu1.4
Expand...http://cpansearch.perl.org/src/JKEENAN/File-Path-2.13/Changes
http://security.cucumberlinux.com/security/details.php?id=153
http://www.debian.org/security/2017/dsa-3873
http://www.securityfocus.com/bid/99180
http://www.securitytracker.com/id/1038610
https://access.redhat.com/security/cve/CVE-2017-6512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512
https://rt.cpan.org/Ticket/Display.html?id=121951
https://security.gentoo.org/glsa/201709-12
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
php5-cli CVE-2015-8835 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.securityfocus.com/bid/84426
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8835
https://bugs.php.net/bug.php?id=70081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835
https://ubuntu.com/security/notices/USN-2952-1
php5-cli CVE-2015-8838 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=97aa752fee61fccdec361279adbfb17a3c60f3f4
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8838
https://bugs.php.net/bug.php?id=69669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8838
https://ubuntu.com/security/notices/USN-2952-1
php5-cli CVE-2015-8866 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://framework.zend.com/security/advisory/ZF2015-06 -> Relation to CVE-2015-5161
http://git.php.net/?p=php-src.git;a=commit;h=de31324c221c1791b26350ba106cc26bad23ace9
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/21/8
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/87470
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8866
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817
https://bugs.php.net/bug.php?id=64938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866
https://ubuntu.com/security/notices/USN-2952-1
php5-cli CVE-2015-8867 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/21/8
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8867
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1534203
https://bugs.php.net/bug.php?id=70014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8867
https://ubuntu.com/security/notices/USN-2952-1
php5-cli CVE-2015-8876 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.php.net/ChangeLog-5.php
https://access.redhat.com/security/cve/CVE-2015-8876
https://bugs.php.net/bug.php?id=70121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8876
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2015-8935 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/06/20/3
https://access.redhat.com/security/cve/CVE-2015-8935
https://bugs.php.net/bug.php?id=68978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8935
https://github.com/php/php-src/commit/996faf964bba1aec06b153b370a7f20d3dd2bb8b?w=1
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-10160 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95783
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10160
https://bugs.php.net/bug.php?id=73768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160
https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-cli CVE-2016-10397 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99552
https://access.redhat.com/security/cve/CVE-2016-10397
https://bugs.php.net/bug.php?id=73192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10397
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-cli CVE-2016-2554 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/02/22/5
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-2554
https://bugs.php.net/bug.php?id=71488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-2952-1
php5-cli CVE-2016-3141 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b1bd4119bcafab6f9a8f84d92cd65eec3afeface
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/10/5
http://www.openwall.com/lists/oss-security/2016/03/13/1
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
http://www.securityfocus.com/bid/84271
http://www.securitytracker.com/id/1035255
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3141
https://bugs.php.net/bug.php?id=71587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141
https://php.net/ChangeLog-5.php
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
php5-cli CVE-2016-3185 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://php.net/ChangeLog-7.php#7.0.4
http://www.securityfocus.com/bid/84307
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3185
https://bugs.php.net/bug.php?id=70081
https://bugs.php.net/bug.php?id=71610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3185
https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba
https://secure.php.net/ChangeLog-5.php#5.6.12
https://ubuntu.com/security/notices/USN-2952-1
php5-cli CVE-2016-4070 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85801
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4070
https://bugs.php.net/bug.php?id=71798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070
https://git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
php5-cli CVE-2016-4071 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85800
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4071
https://bugs.php.net/bug.php?id=71704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4071
https://git.php.net/?p=php-src.git;a=commit;h=6e25966544fb1d2f3d7596e060ce9c9269bbdcf8
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://www.exploit-db.com/exploits/39645/
php5-cli CVE-2016-4072 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85993
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4072
https://bugs.php.net/bug.php?id=71860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4072
https://gist.github.com/smalyshev/80b5c2909832872f2ba2
https://git.php.net/?p=php-src.git;a=commit;h=1e9b175204e3286d64dfd6c9f09151c31b5e099a
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
php5-cli CVE-2016-4073 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85991
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4073
https://bugs.php.net/bug.php?id=71906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4073
https://gist.github.com/smalyshev/d8355c96a657cc5dba70
https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
php5-cli CVE-2016-4342 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/28/2
http://www.securityfocus.com/bid/89154
https://access.redhat.com/security/cve/CVE-2016-4342
https://bugs.php.net/bug.php?id=71354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://ubuntu.com/security/notices/USN-2984-1
php5-cli CVE-2016-4343 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/28/2
http://www.securityfocus.com/bid/89179
https://access.redhat.com/security/cve/CVE-2016-4343
https://bugs.php.net/bug.php?id=71331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4343
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://ubuntu.com/security/notices/USN-2984-1
php5-cli CVE-2016-4538 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90173
https://access.redhat.com/security/cve/CVE-2016-4538
https://bugs.php.net/bug.php?id=72093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538
https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-cli CVE-2016-4539 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90174
https://access.redhat.com/security/cve/CVE-2016-4539
https://bugs.php.net/bug.php?id=72099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539
https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-cli CVE-2016-5385 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-7.php#7.0.9
http://rhn.redhat.com/errata/RHSA-2016-1609.html
http://rhn.redhat.com/errata/RHSA-2016-1610.html
http://rhn.redhat.com/errata/RHSA-2016-1611.html
http://rhn.redhat.com/errata/RHSA-2016-1612.html
http://rhn.redhat.com/errata/RHSA-2016-1613.html
http://www.debian.org/security/2016/dsa-3631
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91821
http://www.securitytracker.com/id/1036335
https://access.redhat.com/security/cve/CVE-2016-5385
https://bugzilla.redhat.com/show_bug.cgi?id=1353794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385
https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml
https://github.com/advisories/GHSA-m6ch-gg5f-wxx3
https://github.com/guzzle/guzzle/releases/tag/6.2.1
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5385.html
https://linux.oracle.com/errata/ELSA-2016-1613.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/
https://nvd.nist.gov/vuln/detail/CVE-2016-5385
https://security.gentoo.org/glsa/201611-22
https://typo3.org/security/advisory/typo3-core-sa-2016-019
https://ubuntu.com/security/notices/USN-3045-1
https://www.drupal.org/SA-CORE-2016-003
php5-cli CVE-2016-5399 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://php.net/ChangeLog-7.php#7.0.9
http://rhn.redhat.com/errata/RHSA-2016-2598.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://seclists.org/fulldisclosure/2016/Jul/72
http://www.debian.org/security/2016/dsa-3631
http://www.openwall.com/lists/oss-security/2016/07/21/1
http://www.securityfocus.com/archive/1/538966/100/0/threaded
http://www.securityfocus.com/bid/92051
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-5399
https://bugs.php.net/bug.php?id=72613
https://bugzilla.redhat.com/show_bug.cgi?id=1358395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399
https://linux.oracle.com/cve/CVE-2016-5399.html
https://linux.oracle.com/errata/ELSA-2016-2598.html
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3045-1
https://www.exploit-db.com/exploits/40155/
php5-cli CVE-2016-5768 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/5b597a2e5b28e2d5a52fc1be13f425f08f47cb62?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2598.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91396
https://access.redhat.com/security/cve/CVE-2016-5768
https://bugs.php.net/bug.php?id=72402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://linux.oracle.com/cve/CVE-2016-5768.html
https://linux.oracle.com/errata/ELSA-2016-2598.html
https://marc.info/?l=oss-security&m=146668499803695&w=2
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-5769 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91399
https://access.redhat.com/security/cve/CVE-2016-5769
https://bugs.php.net/bug.php?id=72455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://marc.info/?l=oss-security&m=146668499803695&w=2
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-5772 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91398
https://access.redhat.com/security/cve/CVE-2016-5772
https://bugs.php.net/bug.php?id=72340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-6288 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=629e4da7cc8b174acdeab84969cbfc606a019b31
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.securityfocus.com/bid/92111
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6288
https://bugs.php.net/70480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-6289 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities
http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92074
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6289
https://bugs.php.net/72513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-6290 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=3798eb6fd5dddb211b01d41495072fd9858d4e32
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92097
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6290
https://bugs.php.net/72562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-6291 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=eebcbd5de38a0f1c2876035402cb770e37476519
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92073
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6291
https://bugs.php.net/72603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-6292 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=41131cd41d2fd2e0c2f332a27988df75659c42e4
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92078
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6292
https://bugs.php.net/72618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-6294 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92115
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6294
https://bugs.php.net/72533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-6295 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=cab1c3b3708eead315e033359d07049b23b147a3
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92094
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6295
https://bugs.php.net/72479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-6296 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e6c48213c22ed50b2b987b479fcc1ac709394caa
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92095
http://www.securitytracker.com/id/1036430
http://www.ubuntu.com/usn/USN-3059-1
https://access.redhat.com/security/cve/CVE-2016-6296
https://bugs.php.net/72606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296
https://lists.debian.org/debian-lts-announce/2019/11/msg00029.html
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
https://ubuntu.com/security/notices/USN-3059-1
php5-cli CVE-2016-6297 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities
http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92099
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6297
https://bugs.php.net/72520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-7127 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92757
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7127
https://bugs.php.net/bug.php?id=72730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
https://github.com/php/php-src/commit/1bd103df00f49cf4d4ade2cfe3f456ac058a4eae?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-7129 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92758
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7129
https://bugs.php.net/bug.php?id=72749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
https://github.com/php/php-src/commit/426aeb2808955ee3d3f52e0cfb102834cdb836a5?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-7130 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92764
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7130
https://bugs.php.net/bug.php?id=72750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130
https://github.com/php/php-src/commit/698a691724c0a949295991e5df091ce16f899e02?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-7131 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92768
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7131
https://bugs.php.net/bug.php?id=72790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131
https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-7132 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92767
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7132
https://bugs.php.net/bug.php?id=72799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132
https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-7411 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/93009
http://www.securitytracker.com/id/1036836
https://access.redhat.com/security/cve/CVE-2016-7411
https://bugs.php.net/bug.php?id=73052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411
https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
php5-cli CVE-2016-7412 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93005
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7412
https://bugs.php.net/bug.php?id=72293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412
https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-7413 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93006
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7413
https://bugs.php.net/bug.php?id=72860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413
https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-7414 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93004
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7414
https://bugs.php.net/bug.php?id=72928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414
https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-7417 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93007
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7417
https://bugs.php.net/bug.php?id=73029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417
https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-7478 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7
http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
http://www.securityfocus.com/bid/95150
https://access.redhat.com/security/cve/CVE-2016-7478
https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
https://bugs.php.net/bug.php?id=73093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://www.youtube.com/watch?v=LDcaPstAuPk
php5-cli CVE-2016-7479 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7
http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
http://www.securityfocus.com/bid/95151
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7479
https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
https://bugs.php.net/bug.php?id=73092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.youtube.com/watch?v=LDcaPstAuPk
php5-cli CVE-2016-9934 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.openwall.com/lists/oss-security/2016/12/12/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/94845
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-9934
https://bugs.php.net/bug.php?id=73331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d
https://ubuntu.com/security/notices/USN-3196-1
php5-cli CVE-2016-9935 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.debian.org/security/2016/dsa-3737
http://www.openwall.com/lists/oss-security/2016/12/12/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/94846
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-9935
https://bugs.php.net/bug.php?id=73631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
https://security.gentoo.org/glsa/201702-29
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
php5-cli CVE-2017-11143 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/99553
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11143
https://bugs.php.net/bug.php?id=74145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143
https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
php5-cli CVE-2017-11144 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=73cabfedf519298e1a11192699f44d53c529315e
http://git.php.net/?p=php-src.git;a=commit;h=89637c6b41b510c20d262c17483f582f115c66d6
http://git.php.net/?p=php-src.git;a=commit;h=91826a311dd37f4c4e5d605fa7af331e80ddd4c3
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11144
https://bugs.php.net/bug.php?id=74651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
php5-cli CVE-2017-11145 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e8b7698f5ee757ce2c8bd10a192a491a498f891c
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99550
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11145
https://bugs.php.net/bug.php?id=74819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145
https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
php5-cli CVE-2017-11147 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99607
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11147
https://bugs.php.net/bug.php?id=73773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11147
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.tenable.com/security/tns-2017-12
php5-cli CVE-2017-11628 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e
http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c
http://www.securityfocus.com/bid/99489
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11628
https://bugs.php.net/bug.php?id=74603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628
https://security.gentoo.org/glsa/201709-21
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
php5-cli CVE-2017-9224 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/101244
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224
https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b
https://github.com/kkos/oniguruma/issues/57
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-cli CVE-2017-9226 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/101244
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226
https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
https://github.com/kkos/oniguruma/issues/55
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-cli CVE-2017-9227 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/100538
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227
https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814
https://github.com/kkos/oniguruma/issues/58
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-cli CVE-2017-9228 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228
https://github.com/kkos/oniguruma/commit/3b63d12038c8d8fc278e81c942fa9bec7c704c8b
https://github.com/kkos/oniguruma/issues/60
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-cli CVE-2017-9229 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229
https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d
https://github.com/kkos/oniguruma/issues/59
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-cli CVE-2018-10545 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104022
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10545
https://bugs.php.net/bug.php?id=75605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10545
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
php5-cli CVE-2018-10546 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104019
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10546
https://bugs.php.net/bug.php?id=76249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://usn.ubuntu.com/3646-1/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
php5-cli CVE-2018-10547 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10547
https://bugs.php.net/bug.php?id=76129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547
https://linux.oracle.com/cve/CVE-2018-10547.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
php5-cli CVE-2018-10548 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104019
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10548
https://bugs.php.net/bug.php?id=76248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
https://www.tenable.com/security/tns-2019-07
php5-cli CVE-2018-14883 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104871
https://access.redhat.com/security/cve/CVE-2018-14883
https://bugs.php.net/bug.php?id=76423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883
https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html
https://security.netapp.com/advisory/ntap-20181107-0003/
https://ubuntu.com/security/notices/USN-3766-1
https://ubuntu.com/security/notices/USN-3766-2
https://usn.ubuntu.com/3766-1/
https://usn.ubuntu.com/3766-2/
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2018-12
php5-cli CVE-2018-17082 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-17082
https://bugs.php.net/bug.php?id=76582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082
https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e
https://lists.debian.org/debian-lts-announce/2018/09/msg00020.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180924-0001/
https://ubuntu.com/security/notices/USN-3766-1
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2019-07
php5-cli CVE-2018-5712 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/102742
http://www.securityfocus.com/bid/104020
http://www.securitytracker.com/id/1040363
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-5712
https://bugs.php.net/bug.php?id=74782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712
https://linux.oracle.com/cve/CVE-2018-5712.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html
https://ubuntu.com/security/notices/USN-3566-1
https://ubuntu.com/security/notices/USN-3600-1
https://ubuntu.com/security/notices/USN-3600-2
https://usn.ubuntu.com/3566-1/
https://usn.ubuntu.com/3600-1/
https://usn.ubuntu.com/3600-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
php5-cli CVE-2018-7584 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.24
Expand...http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/103204
http://www.securitytracker.com/id/1041607
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-7584
https://bugs.php.net/bug.php?id=75981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584
https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
https://linux.oracle.com/cve/CVE-2018-7584.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://ubuntu.com/security/notices/USN-3600-1
https://ubuntu.com/security/notices/USN-3600-2
https://usn.ubuntu.com/3600-1/
https://usn.ubuntu.com/3600-2/
https://www.debian.org/security/2018/dsa-4240
https://www.exploit-db.com/exploits/44846/
https://www.tenable.com/security/tns-2018-03
https://www.tenable.com/security/tns-2018-12
php5-cli CVE-2019-9020 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9020
https://bugs.php.net/bug.php?id=77242
https://bugs.php.net/bug.php?id=77249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020
https://linux.oracle.com/cve/CVE-2019-9020.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-cli CVE-2019-9021 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/106747
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9021
https://bugs.php.net/bug.php?id=77247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9021
https://linux.oracle.com/cve/CVE-2019-9021.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-cli CVE-2019-9022 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9022
https://bugs.php.net/bug.php?id=77369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9022
https://linux.oracle.com/cve/CVE-2019-9022.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4398
https://www.tenable.com/security/tns-2019-07
php5-cli CVE-2019-9023 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9023
https://bugs.php.net/bug.php?id=77370
https://bugs.php.net/bug.php?id=77371
https://bugs.php.net/bug.php?id=77381
https://bugs.php.net/bug.php?id=77382
https://bugs.php.net/bug.php?id=77385
https://bugs.php.net/bug.php?id=77394
https://bugs.php.net/bug.php?id=77418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023
https://linux.oracle.com/cve/CVE-2019-9023.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://support.f5.com/csp/article/K06372014
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-cli CVE-2019-9024 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9024
https://bugs.php.net/bug.php?id=77380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024
https://linux.oracle.com/cve/CVE-2019-9024.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-cli CVE-2019-9638 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9638
https://bugs.php.net/bug.php?id=77563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638
https://linux.oracle.com/cve/CVE-2019-9638.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-cli CVE-2019-9639 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9639
https://bugs.php.net/bug.php?id=77659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639
https://linux.oracle.com/cve/CVE-2019-9639.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-cli CVE-2019-9640 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9640
https://bugs.php.net/bug.php?id=77540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640
https://linux.oracle.com/cve/CVE-2019-9640.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-cli CVE-2019-9641 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2019-9641
https://bugs.php.net/bug.php?id=77509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-cli CVE-2014-9767 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/16/20
http://www.securityfocus.com/bid/76652
http://www.securitytracker.com/id/1035311
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2014-9767
https://bugs.php.net/bug.php?id=67996
https://bugs.php.net/bug.php?id=70350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9767
https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686
https://ubuntu.com/security/notices/USN-2952-1
php5-cli CVE-2014-9912 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://www.openwall.com/lists/oss-security/2016/11/25/1
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/68549
https://access.redhat.com/security/cve/CVE-2014-9912
https://bugs.php.net/bug.php?id=67397
https://bugzilla.redhat.com/show_bug.cgi?id=1383569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9912
https://marc.info/?l=oss-security&m=148003512008712&w=2
https://ubuntu.com/security/notices/USN-3196-1
php5-cli CVE-2015-4116 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=1cbd25ca15383394ffa9ee8601c5de4c0f2f90e1
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
https://access.redhat.com/security/cve/CVE-2015-4116
https://bugs.php.net/bug.php?id=69737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116
https://ubuntu.com/security/notices/USN-3045-1
https://www.htbridge.com/advisory/HTB23262
php5-cli CVE-2015-8865 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://bugs.gw.com/view.php?id=522
http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85802
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8865
https://bugs.php.net/bug.php?id=71527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
php5-cli CVE-2015-8873 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=4d2278143a08b7522de9471d0f014d7357c28fea
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
https://access.redhat.com/security/cve/CVE-2015-8873
https://bugs.php.net/bug.php?id=69793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8873
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2015-8994 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://marc.info/?l=php-internals&m=147876797317925&w=2
http://marc.info/?l=php-internals&m=147921016724565&w=2
http://openwall.com/lists/oss-security/2017/02/28/1
http://seclists.org/oss-sec/2016/q4/343
http://seclists.org/oss-sec/2017/q1/520
https://access.redhat.com/security/cve/CVE-2015-8994
https://bugs.php.net/bug.php?id=69090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8994
https://ma.ttias.be/a-better-way-to-run-php-fpm/
https://ubuntu.com/security/notices/USN-3382-1
php5-cli CVE-2016-10158 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95764
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10158
https://bugs.php.net/bug.php?id=73737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158
https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-cli CVE-2016-10159 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95774
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10159
https://bugs.php.net/bug.php?id=73764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159
https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-cli CVE-2016-10161 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95768
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10161
https://bugs.php.net/bug.php?id=73825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161
https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-cli CVE-2016-10712 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.24
Expand...https://access.redhat.com/security/cve/CVE-2016-10712
https://bugs.php.net/bug.php?id=71323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10712
https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5
https://ubuntu.com/security/notices/USN-3566-2
https://ubuntu.com/security/notices/USN-3600-1
https://usn.ubuntu.com/3566-2/
https://usn.ubuntu.com/3600-1/
php5-cli CVE-2016-1903 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/01/14/8
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/79916
http://www.securitytracker.com/id/1034608
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-1903
https://bugs.php.net/bug.php?id=70976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-2952-1
php5-cli CVE-2016-3142 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/10/5
http://www.openwall.com/lists/oss-security/2016/03/13/2
http://www.securitytracker.com/id/1035255
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3142
https://bugs.php.net/bug.php?id=71498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142
https://git.php.net/?p=php-src.git;a=commit;h=a6fdc5bb27b20d889de0cd29318b3968aabb57bd
https://php.net/ChangeLog-5.php
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
php5-cli CVE-2016-4537 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90173
https://access.redhat.com/security/cve/CVE-2016-4537
https://bugs.php.net/bug.php?id=72093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537
https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-cli CVE-2016-4540 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90172
https://access.redhat.com/security/cve/CVE-2016-4540
https://bugs.php.net/bug.php?id=72061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540
https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-cli CVE-2016-4541 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90172
https://access.redhat.com/security/cve/CVE-2016-4541
https://bugs.php.net/bug.php?id=72061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541
https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-cli CVE-2016-4542 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4542
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-cli CVE-2016-4543 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4543
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-cli CVE-2016-4544 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4544
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-cli CVE-2016-5093 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90946
https://access.redhat.com/security/cve/CVE-2016-5093
https://bugs.php.net/bug.php?id=72241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
https://github.com/php/php-src/commit/97eff7eb57fc2320c267a949cffd622c38712484?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-5094 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90857
https://access.redhat.com/security/cve/CVE-2016-5094
https://bugs.php.net/bug.php?id=72135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
https://github.com/php/php-src/commit/0da8b8b801f9276359262f1ef8274c7812d3dfda?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-5095 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/92144
https://access.redhat.com/security/cve/CVE-2016-5095
https://bugs.php.net/bug.php?id=72135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095
https://gist.github.com/8ef775c117d84ff15185953990a28576
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-5096 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90861
https://access.redhat.com/security/cve/CVE-2016-5096
https://bugs.php.net/bug.php?id=72114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
https://github.com/php/php-src/commit/abd159cce48f3e34f08e4751c568e09677d5ec9c?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-5114 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://seclists.org/bugtraq/2016/Jan/117
http://www.openwall.com/lists/oss-security/2016/02/02/4
http://www.openwall.com/lists/oss-security/2016/05/29/1
http://www.search-lab.hu/about-us/news/111-some-unusual-vulnerabilities-in-the-php-engine
https://access.redhat.com/security/cve/CVE-2016-5114
https://bugs.php.net/bug.php?id=70755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-5771 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91401
https://access.redhat.com/security/cve/CVE-2016-5771
https://bugs.php.net/bug.php?id=72433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-cli CVE-2016-5773 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91397
https://access.redhat.com/security/cve/CVE-2016-5773
https://bugs.php.net/bug.php?id=72434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
https://www.evonide.com/breaking-phps-garbage-collection-and-unserialize/
php5-cli CVE-2016-7124 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92756
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7124
https://bugs.php.net/bug.php?id=72663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124
https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-7125 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92552
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7125
https://bugs.php.net/bug.php?id=72681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125
https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-7128 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92564
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7128
https://bugs.php.net/bug.php?id=72627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128
https://github.com/php/php-src/commit/6dbb1ee46b5f4725cc6519abf91e512a2a10dfed?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-7416 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93008
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7416
https://bugs.php.net/bug.php?id=73007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416
https://github.com/php/php-src/commit/6d55ba265637d6adf0ba7e9c9ef11187d1ec2f5b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-7418 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93011
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7418
https://bugs.php.net/bug.php?id=73065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418
https://github.com/php/php-src/commit/c4cca4c20e75359c9a13a1f9a36cb7b4e9601d29?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2016-9137 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f
http://www.debian.org/security/2016/dsa-3698
http://www.openwall.com/lists/oss-security/2016/10/18/1
http://www.openwall.com/lists/oss-security/2016/11/01/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93577
https://access.redhat.com/security/cve/CVE-2016-9137
https://bugs.php.net/bug.php?id=73147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2016-19
php5-cli CVE-2017-11362 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11362
https://bugs.php.net/bug.php?id=73473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11362
https://security.gentoo.org/glsa/201709-21
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3566-2
https://usn.ubuntu.com/3566-2/
php5-cli CVE-2017-12933 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99490
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-12933
https://bugs.php.net/bug.php?id=74111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933
https://ubuntu.com/security/notices/USN-3566-1
https://ubuntu.com/security/notices/USN-3566-2
https://usn.ubuntu.com/3566-1/
https://usn.ubuntu.com/3566-2/
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
php5-cli CVE-2017-16642 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/101745
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2017-16642
https://bugs.php.net/bug.php?id=75055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642
https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
https://security.netapp.com/advisory/ntap-20181123-0001/
https://ubuntu.com/security/notices/USN-3566-1
https://usn.ubuntu.com/3566-1/
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.exploit-db.com/exploits/43133/
php5-cli CVE-2018-14851 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104871
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-14851
https://bugs.php.net/bug.php?id=76557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851
https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html
https://security.netapp.com/advisory/ntap-20181107-0003/
https://ubuntu.com/security/notices/USN-3766-1
https://ubuntu.com/security/notices/USN-3766-2
https://usn.ubuntu.com/3766-1/
https://usn.ubuntu.com/3766-2/
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2018-12
php5-cli CVE-2019-9637 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9637
https://bugs.php.net/bug.php?id=77630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637
https://linux.oracle.com/cve/CVE-2019-9637.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://support.f5.com/csp/article/K53825211
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
https://www.tenable.com/security/tns-2019-07
php5-cli CVE-2019-9675 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://php.net/ChangeLog-7.php
https://access.redhat.com/security/cve/CVE-2019-9675
https://bugs.php.net/bug.php?id=77586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
php5-common CVE-2015-8835 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.securityfocus.com/bid/84426
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8835
https://bugs.php.net/bug.php?id=70081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835
https://ubuntu.com/security/notices/USN-2952-1
php5-common CVE-2015-8838 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=97aa752fee61fccdec361279adbfb17a3c60f3f4
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8838
https://bugs.php.net/bug.php?id=69669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8838
https://ubuntu.com/security/notices/USN-2952-1
php5-common CVE-2015-8866 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://framework.zend.com/security/advisory/ZF2015-06 -> Relation to CVE-2015-5161
http://git.php.net/?p=php-src.git;a=commit;h=de31324c221c1791b26350ba106cc26bad23ace9
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/21/8
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/87470
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8866
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817
https://bugs.php.net/bug.php?id=64938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866
https://ubuntu.com/security/notices/USN-2952-1
php5-common CVE-2015-8867 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/21/8
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8867
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1534203
https://bugs.php.net/bug.php?id=70014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8867
https://ubuntu.com/security/notices/USN-2952-1
php5-common CVE-2015-8876 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.php.net/ChangeLog-5.php
https://access.redhat.com/security/cve/CVE-2015-8876
https://bugs.php.net/bug.php?id=70121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8876
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2015-8935 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/06/20/3
https://access.redhat.com/security/cve/CVE-2015-8935
https://bugs.php.net/bug.php?id=68978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8935
https://github.com/php/php-src/commit/996faf964bba1aec06b153b370a7f20d3dd2bb8b?w=1
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-10160 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95783
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10160
https://bugs.php.net/bug.php?id=73768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160
https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-common CVE-2016-10397 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99552
https://access.redhat.com/security/cve/CVE-2016-10397
https://bugs.php.net/bug.php?id=73192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10397
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-common CVE-2016-2554 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/02/22/5
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-2554
https://bugs.php.net/bug.php?id=71488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-2952-1
php5-common CVE-2016-3141 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b1bd4119bcafab6f9a8f84d92cd65eec3afeface
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/10/5
http://www.openwall.com/lists/oss-security/2016/03/13/1
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
http://www.securityfocus.com/bid/84271
http://www.securitytracker.com/id/1035255
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3141
https://bugs.php.net/bug.php?id=71587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141
https://php.net/ChangeLog-5.php
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
php5-common CVE-2016-3185 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://php.net/ChangeLog-7.php#7.0.4
http://www.securityfocus.com/bid/84307
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3185
https://bugs.php.net/bug.php?id=70081
https://bugs.php.net/bug.php?id=71610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3185
https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba
https://secure.php.net/ChangeLog-5.php#5.6.12
https://ubuntu.com/security/notices/USN-2952-1
php5-common CVE-2016-4070 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85801
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4070
https://bugs.php.net/bug.php?id=71798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070
https://git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
php5-common CVE-2016-4071 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85800
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4071
https://bugs.php.net/bug.php?id=71704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4071
https://git.php.net/?p=php-src.git;a=commit;h=6e25966544fb1d2f3d7596e060ce9c9269bbdcf8
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://www.exploit-db.com/exploits/39645/
php5-common CVE-2016-4072 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85993
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4072
https://bugs.php.net/bug.php?id=71860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4072
https://gist.github.com/smalyshev/80b5c2909832872f2ba2
https://git.php.net/?p=php-src.git;a=commit;h=1e9b175204e3286d64dfd6c9f09151c31b5e099a
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
php5-common CVE-2016-4073 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85991
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4073
https://bugs.php.net/bug.php?id=71906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4073
https://gist.github.com/smalyshev/d8355c96a657cc5dba70
https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
php5-common CVE-2016-4342 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/28/2
http://www.securityfocus.com/bid/89154
https://access.redhat.com/security/cve/CVE-2016-4342
https://bugs.php.net/bug.php?id=71354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://ubuntu.com/security/notices/USN-2984-1
php5-common CVE-2016-4343 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/28/2
http://www.securityfocus.com/bid/89179
https://access.redhat.com/security/cve/CVE-2016-4343
https://bugs.php.net/bug.php?id=71331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4343
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://ubuntu.com/security/notices/USN-2984-1
php5-common CVE-2016-4538 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90173
https://access.redhat.com/security/cve/CVE-2016-4538
https://bugs.php.net/bug.php?id=72093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538
https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-common CVE-2016-4539 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90174
https://access.redhat.com/security/cve/CVE-2016-4539
https://bugs.php.net/bug.php?id=72099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539
https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-common CVE-2016-5385 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-7.php#7.0.9
http://rhn.redhat.com/errata/RHSA-2016-1609.html
http://rhn.redhat.com/errata/RHSA-2016-1610.html
http://rhn.redhat.com/errata/RHSA-2016-1611.html
http://rhn.redhat.com/errata/RHSA-2016-1612.html
http://rhn.redhat.com/errata/RHSA-2016-1613.html
http://www.debian.org/security/2016/dsa-3631
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91821
http://www.securitytracker.com/id/1036335
https://access.redhat.com/security/cve/CVE-2016-5385
https://bugzilla.redhat.com/show_bug.cgi?id=1353794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385
https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml
https://github.com/advisories/GHSA-m6ch-gg5f-wxx3
https://github.com/guzzle/guzzle/releases/tag/6.2.1
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5385.html
https://linux.oracle.com/errata/ELSA-2016-1613.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/
https://nvd.nist.gov/vuln/detail/CVE-2016-5385
https://security.gentoo.org/glsa/201611-22
https://typo3.org/security/advisory/typo3-core-sa-2016-019
https://ubuntu.com/security/notices/USN-3045-1
https://www.drupal.org/SA-CORE-2016-003
php5-common CVE-2016-5399 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://php.net/ChangeLog-7.php#7.0.9
http://rhn.redhat.com/errata/RHSA-2016-2598.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://seclists.org/fulldisclosure/2016/Jul/72
http://www.debian.org/security/2016/dsa-3631
http://www.openwall.com/lists/oss-security/2016/07/21/1
http://www.securityfocus.com/archive/1/538966/100/0/threaded
http://www.securityfocus.com/bid/92051
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-5399
https://bugs.php.net/bug.php?id=72613
https://bugzilla.redhat.com/show_bug.cgi?id=1358395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399
https://linux.oracle.com/cve/CVE-2016-5399.html
https://linux.oracle.com/errata/ELSA-2016-2598.html
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3045-1
https://www.exploit-db.com/exploits/40155/
php5-common CVE-2016-5768 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/5b597a2e5b28e2d5a52fc1be13f425f08f47cb62?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2598.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91396
https://access.redhat.com/security/cve/CVE-2016-5768
https://bugs.php.net/bug.php?id=72402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://linux.oracle.com/cve/CVE-2016-5768.html
https://linux.oracle.com/errata/ELSA-2016-2598.html
https://marc.info/?l=oss-security&m=146668499803695&w=2
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-5769 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91399
https://access.redhat.com/security/cve/CVE-2016-5769
https://bugs.php.net/bug.php?id=72455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://marc.info/?l=oss-security&m=146668499803695&w=2
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-5772 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91398
https://access.redhat.com/security/cve/CVE-2016-5772
https://bugs.php.net/bug.php?id=72340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-6288 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=629e4da7cc8b174acdeab84969cbfc606a019b31
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.securityfocus.com/bid/92111
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6288
https://bugs.php.net/70480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-6289 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities
http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92074
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6289
https://bugs.php.net/72513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-6290 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=3798eb6fd5dddb211b01d41495072fd9858d4e32
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92097
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6290
https://bugs.php.net/72562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-6291 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=eebcbd5de38a0f1c2876035402cb770e37476519
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92073
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6291
https://bugs.php.net/72603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-6292 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=41131cd41d2fd2e0c2f332a27988df75659c42e4
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92078
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6292
https://bugs.php.net/72618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-6294 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92115
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6294
https://bugs.php.net/72533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-6295 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=cab1c3b3708eead315e033359d07049b23b147a3
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92094
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6295
https://bugs.php.net/72479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-6296 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e6c48213c22ed50b2b987b479fcc1ac709394caa
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92095
http://www.securitytracker.com/id/1036430
http://www.ubuntu.com/usn/USN-3059-1
https://access.redhat.com/security/cve/CVE-2016-6296
https://bugs.php.net/72606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296
https://lists.debian.org/debian-lts-announce/2019/11/msg00029.html
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
https://ubuntu.com/security/notices/USN-3059-1
php5-common CVE-2016-6297 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities
http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92099
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6297
https://bugs.php.net/72520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-7127 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92757
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7127
https://bugs.php.net/bug.php?id=72730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
https://github.com/php/php-src/commit/1bd103df00f49cf4d4ade2cfe3f456ac058a4eae?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-7129 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92758
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7129
https://bugs.php.net/bug.php?id=72749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
https://github.com/php/php-src/commit/426aeb2808955ee3d3f52e0cfb102834cdb836a5?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-7130 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92764
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7130
https://bugs.php.net/bug.php?id=72750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130
https://github.com/php/php-src/commit/698a691724c0a949295991e5df091ce16f899e02?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-7131 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92768
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7131
https://bugs.php.net/bug.php?id=72790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131
https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-7132 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92767
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7132
https://bugs.php.net/bug.php?id=72799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132
https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-7411 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/93009
http://www.securitytracker.com/id/1036836
https://access.redhat.com/security/cve/CVE-2016-7411
https://bugs.php.net/bug.php?id=73052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411
https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
php5-common CVE-2016-7412 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93005
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7412
https://bugs.php.net/bug.php?id=72293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412
https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-7413 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93006
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7413
https://bugs.php.net/bug.php?id=72860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413
https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-7414 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93004
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7414
https://bugs.php.net/bug.php?id=72928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414
https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-7417 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93007
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7417
https://bugs.php.net/bug.php?id=73029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417
https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-7478 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7
http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
http://www.securityfocus.com/bid/95150
https://access.redhat.com/security/cve/CVE-2016-7478
https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
https://bugs.php.net/bug.php?id=73093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://www.youtube.com/watch?v=LDcaPstAuPk
php5-common CVE-2016-7479 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7
http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
http://www.securityfocus.com/bid/95151
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7479
https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
https://bugs.php.net/bug.php?id=73092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.youtube.com/watch?v=LDcaPstAuPk
php5-common CVE-2016-9934 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.openwall.com/lists/oss-security/2016/12/12/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/94845
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-9934
https://bugs.php.net/bug.php?id=73331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d
https://ubuntu.com/security/notices/USN-3196-1
php5-common CVE-2016-9935 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.debian.org/security/2016/dsa-3737
http://www.openwall.com/lists/oss-security/2016/12/12/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/94846
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-9935
https://bugs.php.net/bug.php?id=73631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
https://security.gentoo.org/glsa/201702-29
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
php5-common CVE-2017-11143 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/99553
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11143
https://bugs.php.net/bug.php?id=74145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143
https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
php5-common CVE-2017-11144 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=73cabfedf519298e1a11192699f44d53c529315e
http://git.php.net/?p=php-src.git;a=commit;h=89637c6b41b510c20d262c17483f582f115c66d6
http://git.php.net/?p=php-src.git;a=commit;h=91826a311dd37f4c4e5d605fa7af331e80ddd4c3
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11144
https://bugs.php.net/bug.php?id=74651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
php5-common CVE-2017-11145 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e8b7698f5ee757ce2c8bd10a192a491a498f891c
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99550
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11145
https://bugs.php.net/bug.php?id=74819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145
https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
php5-common CVE-2017-11147 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99607
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11147
https://bugs.php.net/bug.php?id=73773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11147
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.tenable.com/security/tns-2017-12
php5-common CVE-2017-11628 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e
http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c
http://www.securityfocus.com/bid/99489
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11628
https://bugs.php.net/bug.php?id=74603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628
https://security.gentoo.org/glsa/201709-21
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
php5-common CVE-2017-9224 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/101244
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224
https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b
https://github.com/kkos/oniguruma/issues/57
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-common CVE-2017-9226 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/101244
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226
https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
https://github.com/kkos/oniguruma/issues/55
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-common CVE-2017-9227 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/100538
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227
https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814
https://github.com/kkos/oniguruma/issues/58
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-common CVE-2017-9228 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228
https://github.com/kkos/oniguruma/commit/3b63d12038c8d8fc278e81c942fa9bec7c704c8b
https://github.com/kkos/oniguruma/issues/60
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-common CVE-2017-9229 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229
https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d
https://github.com/kkos/oniguruma/issues/59
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-common CVE-2018-10545 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104022
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10545
https://bugs.php.net/bug.php?id=75605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10545
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
php5-common CVE-2018-10546 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104019
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10546
https://bugs.php.net/bug.php?id=76249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://usn.ubuntu.com/3646-1/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
php5-common CVE-2018-10547 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10547
https://bugs.php.net/bug.php?id=76129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547
https://linux.oracle.com/cve/CVE-2018-10547.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
php5-common CVE-2018-10548 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104019
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10548
https://bugs.php.net/bug.php?id=76248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
https://www.tenable.com/security/tns-2019-07
php5-common CVE-2018-14883 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104871
https://access.redhat.com/security/cve/CVE-2018-14883
https://bugs.php.net/bug.php?id=76423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883
https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html
https://security.netapp.com/advisory/ntap-20181107-0003/
https://ubuntu.com/security/notices/USN-3766-1
https://ubuntu.com/security/notices/USN-3766-2
https://usn.ubuntu.com/3766-1/
https://usn.ubuntu.com/3766-2/
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2018-12
php5-common CVE-2018-17082 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-17082
https://bugs.php.net/bug.php?id=76582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082
https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e
https://lists.debian.org/debian-lts-announce/2018/09/msg00020.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180924-0001/
https://ubuntu.com/security/notices/USN-3766-1
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2019-07
php5-common CVE-2018-5712 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/102742
http://www.securityfocus.com/bid/104020
http://www.securitytracker.com/id/1040363
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-5712
https://bugs.php.net/bug.php?id=74782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712
https://linux.oracle.com/cve/CVE-2018-5712.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html
https://ubuntu.com/security/notices/USN-3566-1
https://ubuntu.com/security/notices/USN-3600-1
https://ubuntu.com/security/notices/USN-3600-2
https://usn.ubuntu.com/3566-1/
https://usn.ubuntu.com/3600-1/
https://usn.ubuntu.com/3600-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
php5-common CVE-2018-7584 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.24
Expand...http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/103204
http://www.securitytracker.com/id/1041607
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-7584
https://bugs.php.net/bug.php?id=75981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584
https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
https://linux.oracle.com/cve/CVE-2018-7584.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://ubuntu.com/security/notices/USN-3600-1
https://ubuntu.com/security/notices/USN-3600-2
https://usn.ubuntu.com/3600-1/
https://usn.ubuntu.com/3600-2/
https://www.debian.org/security/2018/dsa-4240
https://www.exploit-db.com/exploits/44846/
https://www.tenable.com/security/tns-2018-03
https://www.tenable.com/security/tns-2018-12
php5-common CVE-2019-9020 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9020
https://bugs.php.net/bug.php?id=77242
https://bugs.php.net/bug.php?id=77249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020
https://linux.oracle.com/cve/CVE-2019-9020.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-common CVE-2019-9021 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/106747
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9021
https://bugs.php.net/bug.php?id=77247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9021
https://linux.oracle.com/cve/CVE-2019-9021.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-common CVE-2019-9022 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9022
https://bugs.php.net/bug.php?id=77369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9022
https://linux.oracle.com/cve/CVE-2019-9022.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4398
https://www.tenable.com/security/tns-2019-07
php5-common CVE-2019-9023 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9023
https://bugs.php.net/bug.php?id=77370
https://bugs.php.net/bug.php?id=77371
https://bugs.php.net/bug.php?id=77381
https://bugs.php.net/bug.php?id=77382
https://bugs.php.net/bug.php?id=77385
https://bugs.php.net/bug.php?id=77394
https://bugs.php.net/bug.php?id=77418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023
https://linux.oracle.com/cve/CVE-2019-9023.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://support.f5.com/csp/article/K06372014
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-common CVE-2019-9024 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9024
https://bugs.php.net/bug.php?id=77380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024
https://linux.oracle.com/cve/CVE-2019-9024.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-common CVE-2019-9638 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9638
https://bugs.php.net/bug.php?id=77563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638
https://linux.oracle.com/cve/CVE-2019-9638.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-common CVE-2019-9639 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9639
https://bugs.php.net/bug.php?id=77659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639
https://linux.oracle.com/cve/CVE-2019-9639.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-common CVE-2019-9640 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9640
https://bugs.php.net/bug.php?id=77540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640
https://linux.oracle.com/cve/CVE-2019-9640.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-common CVE-2019-9641 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2019-9641
https://bugs.php.net/bug.php?id=77509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-common CVE-2014-9767 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/16/20
http://www.securityfocus.com/bid/76652
http://www.securitytracker.com/id/1035311
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2014-9767
https://bugs.php.net/bug.php?id=67996
https://bugs.php.net/bug.php?id=70350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9767
https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686
https://ubuntu.com/security/notices/USN-2952-1
php5-common CVE-2014-9912 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://www.openwall.com/lists/oss-security/2016/11/25/1
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/68549
https://access.redhat.com/security/cve/CVE-2014-9912
https://bugs.php.net/bug.php?id=67397
https://bugzilla.redhat.com/show_bug.cgi?id=1383569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9912
https://marc.info/?l=oss-security&m=148003512008712&w=2
https://ubuntu.com/security/notices/USN-3196-1
php5-common CVE-2015-4116 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=1cbd25ca15383394ffa9ee8601c5de4c0f2f90e1
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
https://access.redhat.com/security/cve/CVE-2015-4116
https://bugs.php.net/bug.php?id=69737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116
https://ubuntu.com/security/notices/USN-3045-1
https://www.htbridge.com/advisory/HTB23262
php5-common CVE-2015-8865 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://bugs.gw.com/view.php?id=522
http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85802
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8865
https://bugs.php.net/bug.php?id=71527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
php5-common CVE-2015-8873 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=4d2278143a08b7522de9471d0f014d7357c28fea
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
https://access.redhat.com/security/cve/CVE-2015-8873
https://bugs.php.net/bug.php?id=69793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8873
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2015-8994 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://marc.info/?l=php-internals&m=147876797317925&w=2
http://marc.info/?l=php-internals&m=147921016724565&w=2
http://openwall.com/lists/oss-security/2017/02/28/1
http://seclists.org/oss-sec/2016/q4/343
http://seclists.org/oss-sec/2017/q1/520
https://access.redhat.com/security/cve/CVE-2015-8994
https://bugs.php.net/bug.php?id=69090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8994
https://ma.ttias.be/a-better-way-to-run-php-fpm/
https://ubuntu.com/security/notices/USN-3382-1
php5-common CVE-2016-10158 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95764
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10158
https://bugs.php.net/bug.php?id=73737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158
https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-common CVE-2016-10159 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95774
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10159
https://bugs.php.net/bug.php?id=73764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159
https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-common CVE-2016-10161 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95768
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10161
https://bugs.php.net/bug.php?id=73825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161
https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-common CVE-2016-10712 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.24
Expand...https://access.redhat.com/security/cve/CVE-2016-10712
https://bugs.php.net/bug.php?id=71323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10712
https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5
https://ubuntu.com/security/notices/USN-3566-2
https://ubuntu.com/security/notices/USN-3600-1
https://usn.ubuntu.com/3566-2/
https://usn.ubuntu.com/3600-1/
php5-common CVE-2016-1903 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/01/14/8
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/79916
http://www.securitytracker.com/id/1034608
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-1903
https://bugs.php.net/bug.php?id=70976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-2952-1
php5-common CVE-2016-3142 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/10/5
http://www.openwall.com/lists/oss-security/2016/03/13/2
http://www.securitytracker.com/id/1035255
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3142
https://bugs.php.net/bug.php?id=71498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142
https://git.php.net/?p=php-src.git;a=commit;h=a6fdc5bb27b20d889de0cd29318b3968aabb57bd
https://php.net/ChangeLog-5.php
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
php5-common CVE-2016-4537 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90173
https://access.redhat.com/security/cve/CVE-2016-4537
https://bugs.php.net/bug.php?id=72093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537
https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-common CVE-2016-4540 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90172
https://access.redhat.com/security/cve/CVE-2016-4540
https://bugs.php.net/bug.php?id=72061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540
https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-common CVE-2016-4541 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90172
https://access.redhat.com/security/cve/CVE-2016-4541
https://bugs.php.net/bug.php?id=72061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541
https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-common CVE-2016-4542 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4542
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-common CVE-2016-4543 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4543
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-common CVE-2016-4544 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4544
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-common CVE-2016-5093 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90946
https://access.redhat.com/security/cve/CVE-2016-5093
https://bugs.php.net/bug.php?id=72241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
https://github.com/php/php-src/commit/97eff7eb57fc2320c267a949cffd622c38712484?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-5094 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90857
https://access.redhat.com/security/cve/CVE-2016-5094
https://bugs.php.net/bug.php?id=72135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
https://github.com/php/php-src/commit/0da8b8b801f9276359262f1ef8274c7812d3dfda?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-5095 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/92144
https://access.redhat.com/security/cve/CVE-2016-5095
https://bugs.php.net/bug.php?id=72135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095
https://gist.github.com/8ef775c117d84ff15185953990a28576
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-5096 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90861
https://access.redhat.com/security/cve/CVE-2016-5096
https://bugs.php.net/bug.php?id=72114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
https://github.com/php/php-src/commit/abd159cce48f3e34f08e4751c568e09677d5ec9c?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-5114 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://seclists.org/bugtraq/2016/Jan/117
http://www.openwall.com/lists/oss-security/2016/02/02/4
http://www.openwall.com/lists/oss-security/2016/05/29/1
http://www.search-lab.hu/about-us/news/111-some-unusual-vulnerabilities-in-the-php-engine
https://access.redhat.com/security/cve/CVE-2016-5114
https://bugs.php.net/bug.php?id=70755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-5771 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91401
https://access.redhat.com/security/cve/CVE-2016-5771
https://bugs.php.net/bug.php?id=72433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-common CVE-2016-5773 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91397
https://access.redhat.com/security/cve/CVE-2016-5773
https://bugs.php.net/bug.php?id=72434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
https://www.evonide.com/breaking-phps-garbage-collection-and-unserialize/
php5-common CVE-2016-7124 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92756
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7124
https://bugs.php.net/bug.php?id=72663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124
https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-7125 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92552
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7125
https://bugs.php.net/bug.php?id=72681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125
https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-7128 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92564
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7128
https://bugs.php.net/bug.php?id=72627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128
https://github.com/php/php-src/commit/6dbb1ee46b5f4725cc6519abf91e512a2a10dfed?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-7416 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93008
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7416
https://bugs.php.net/bug.php?id=73007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416
https://github.com/php/php-src/commit/6d55ba265637d6adf0ba7e9c9ef11187d1ec2f5b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-7418 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93011
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7418
https://bugs.php.net/bug.php?id=73065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418
https://github.com/php/php-src/commit/c4cca4c20e75359c9a13a1f9a36cb7b4e9601d29?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2016-9137 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f
http://www.debian.org/security/2016/dsa-3698
http://www.openwall.com/lists/oss-security/2016/10/18/1
http://www.openwall.com/lists/oss-security/2016/11/01/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93577
https://access.redhat.com/security/cve/CVE-2016-9137
https://bugs.php.net/bug.php?id=73147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2016-19
php5-common CVE-2017-11362 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11362
https://bugs.php.net/bug.php?id=73473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11362
https://security.gentoo.org/glsa/201709-21
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3566-2
https://usn.ubuntu.com/3566-2/
php5-common CVE-2017-12933 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99490
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-12933
https://bugs.php.net/bug.php?id=74111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933
https://ubuntu.com/security/notices/USN-3566-1
https://ubuntu.com/security/notices/USN-3566-2
https://usn.ubuntu.com/3566-1/
https://usn.ubuntu.com/3566-2/
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
php5-common CVE-2017-16642 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/101745
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2017-16642
https://bugs.php.net/bug.php?id=75055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642
https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
https://security.netapp.com/advisory/ntap-20181123-0001/
https://ubuntu.com/security/notices/USN-3566-1
https://usn.ubuntu.com/3566-1/
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.exploit-db.com/exploits/43133/
php5-common CVE-2018-14851 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104871
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-14851
https://bugs.php.net/bug.php?id=76557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851
https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html
https://security.netapp.com/advisory/ntap-20181107-0003/
https://ubuntu.com/security/notices/USN-3766-1
https://ubuntu.com/security/notices/USN-3766-2
https://usn.ubuntu.com/3766-1/
https://usn.ubuntu.com/3766-2/
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2018-12
php5-common CVE-2019-9637 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9637
https://bugs.php.net/bug.php?id=77630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637
https://linux.oracle.com/cve/CVE-2019-9637.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://support.f5.com/csp/article/K53825211
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
https://www.tenable.com/security/tns-2019-07
php5-common CVE-2019-9675 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://php.net/ChangeLog-7.php
https://access.redhat.com/security/cve/CVE-2019-9675
https://bugs.php.net/bug.php?id=77586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
php5-mysql CVE-2015-8835 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.securityfocus.com/bid/84426
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8835
https://bugs.php.net/bug.php?id=70081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835
https://ubuntu.com/security/notices/USN-2952-1
php5-mysql CVE-2015-8838 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=97aa752fee61fccdec361279adbfb17a3c60f3f4
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8838
https://bugs.php.net/bug.php?id=69669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8838
https://ubuntu.com/security/notices/USN-2952-1
php5-mysql CVE-2015-8866 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://framework.zend.com/security/advisory/ZF2015-06 -> Relation to CVE-2015-5161
http://git.php.net/?p=php-src.git;a=commit;h=de31324c221c1791b26350ba106cc26bad23ace9
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/21/8
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/87470
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8866
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817
https://bugs.php.net/bug.php?id=64938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866
https://ubuntu.com/security/notices/USN-2952-1
php5-mysql CVE-2015-8867 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/21/8
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8867
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1534203
https://bugs.php.net/bug.php?id=70014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8867
https://ubuntu.com/security/notices/USN-2952-1
php5-mysql CVE-2015-8876 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.php.net/ChangeLog-5.php
https://access.redhat.com/security/cve/CVE-2015-8876
https://bugs.php.net/bug.php?id=70121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8876
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2015-8935 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/06/20/3
https://access.redhat.com/security/cve/CVE-2015-8935
https://bugs.php.net/bug.php?id=68978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8935
https://github.com/php/php-src/commit/996faf964bba1aec06b153b370a7f20d3dd2bb8b?w=1
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-10160 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95783
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10160
https://bugs.php.net/bug.php?id=73768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160
https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-mysql CVE-2016-10397 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99552
https://access.redhat.com/security/cve/CVE-2016-10397
https://bugs.php.net/bug.php?id=73192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10397
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-mysql CVE-2016-2554 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/02/22/5
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-2554
https://bugs.php.net/bug.php?id=71488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-2952-1
php5-mysql CVE-2016-3141 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b1bd4119bcafab6f9a8f84d92cd65eec3afeface
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/10/5
http://www.openwall.com/lists/oss-security/2016/03/13/1
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
http://www.securityfocus.com/bid/84271
http://www.securitytracker.com/id/1035255
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3141
https://bugs.php.net/bug.php?id=71587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141
https://php.net/ChangeLog-5.php
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
php5-mysql CVE-2016-3185 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://php.net/ChangeLog-7.php#7.0.4
http://www.securityfocus.com/bid/84307
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3185
https://bugs.php.net/bug.php?id=70081
https://bugs.php.net/bug.php?id=71610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3185
https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba
https://secure.php.net/ChangeLog-5.php#5.6.12
https://ubuntu.com/security/notices/USN-2952-1
php5-mysql CVE-2016-4070 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85801
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4070
https://bugs.php.net/bug.php?id=71798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070
https://git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
php5-mysql CVE-2016-4071 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85800
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4071
https://bugs.php.net/bug.php?id=71704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4071
https://git.php.net/?p=php-src.git;a=commit;h=6e25966544fb1d2f3d7596e060ce9c9269bbdcf8
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://www.exploit-db.com/exploits/39645/
php5-mysql CVE-2016-4072 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85993
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4072
https://bugs.php.net/bug.php?id=71860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4072
https://gist.github.com/smalyshev/80b5c2909832872f2ba2
https://git.php.net/?p=php-src.git;a=commit;h=1e9b175204e3286d64dfd6c9f09151c31b5e099a
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
php5-mysql CVE-2016-4073 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85991
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4073
https://bugs.php.net/bug.php?id=71906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4073
https://gist.github.com/smalyshev/d8355c96a657cc5dba70
https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
php5-mysql CVE-2016-4342 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/28/2
http://www.securityfocus.com/bid/89154
https://access.redhat.com/security/cve/CVE-2016-4342
https://bugs.php.net/bug.php?id=71354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://ubuntu.com/security/notices/USN-2984-1
php5-mysql CVE-2016-4343 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/28/2
http://www.securityfocus.com/bid/89179
https://access.redhat.com/security/cve/CVE-2016-4343
https://bugs.php.net/bug.php?id=71331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4343
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://ubuntu.com/security/notices/USN-2984-1
php5-mysql CVE-2016-4538 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90173
https://access.redhat.com/security/cve/CVE-2016-4538
https://bugs.php.net/bug.php?id=72093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538
https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-mysql CVE-2016-4539 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90174
https://access.redhat.com/security/cve/CVE-2016-4539
https://bugs.php.net/bug.php?id=72099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539
https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-mysql CVE-2016-5385 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-7.php#7.0.9
http://rhn.redhat.com/errata/RHSA-2016-1609.html
http://rhn.redhat.com/errata/RHSA-2016-1610.html
http://rhn.redhat.com/errata/RHSA-2016-1611.html
http://rhn.redhat.com/errata/RHSA-2016-1612.html
http://rhn.redhat.com/errata/RHSA-2016-1613.html
http://www.debian.org/security/2016/dsa-3631
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91821
http://www.securitytracker.com/id/1036335
https://access.redhat.com/security/cve/CVE-2016-5385
https://bugzilla.redhat.com/show_bug.cgi?id=1353794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385
https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml
https://github.com/advisories/GHSA-m6ch-gg5f-wxx3
https://github.com/guzzle/guzzle/releases/tag/6.2.1
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5385.html
https://linux.oracle.com/errata/ELSA-2016-1613.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/
https://nvd.nist.gov/vuln/detail/CVE-2016-5385
https://security.gentoo.org/glsa/201611-22
https://typo3.org/security/advisory/typo3-core-sa-2016-019
https://ubuntu.com/security/notices/USN-3045-1
https://www.drupal.org/SA-CORE-2016-003
php5-mysql CVE-2016-5399 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://php.net/ChangeLog-7.php#7.0.9
http://rhn.redhat.com/errata/RHSA-2016-2598.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://seclists.org/fulldisclosure/2016/Jul/72
http://www.debian.org/security/2016/dsa-3631
http://www.openwall.com/lists/oss-security/2016/07/21/1
http://www.securityfocus.com/archive/1/538966/100/0/threaded
http://www.securityfocus.com/bid/92051
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-5399
https://bugs.php.net/bug.php?id=72613
https://bugzilla.redhat.com/show_bug.cgi?id=1358395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399
https://linux.oracle.com/cve/CVE-2016-5399.html
https://linux.oracle.com/errata/ELSA-2016-2598.html
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3045-1
https://www.exploit-db.com/exploits/40155/
php5-mysql CVE-2016-5768 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/5b597a2e5b28e2d5a52fc1be13f425f08f47cb62?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2598.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91396
https://access.redhat.com/security/cve/CVE-2016-5768
https://bugs.php.net/bug.php?id=72402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://linux.oracle.com/cve/CVE-2016-5768.html
https://linux.oracle.com/errata/ELSA-2016-2598.html
https://marc.info/?l=oss-security&m=146668499803695&w=2
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-5769 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91399
https://access.redhat.com/security/cve/CVE-2016-5769
https://bugs.php.net/bug.php?id=72455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://marc.info/?l=oss-security&m=146668499803695&w=2
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-5772 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91398
https://access.redhat.com/security/cve/CVE-2016-5772
https://bugs.php.net/bug.php?id=72340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-6288 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=629e4da7cc8b174acdeab84969cbfc606a019b31
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.securityfocus.com/bid/92111
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6288
https://bugs.php.net/70480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-6289 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities
http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92074
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6289
https://bugs.php.net/72513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-6290 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=3798eb6fd5dddb211b01d41495072fd9858d4e32
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92097
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6290
https://bugs.php.net/72562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-6291 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=eebcbd5de38a0f1c2876035402cb770e37476519
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92073
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6291
https://bugs.php.net/72603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-6292 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=41131cd41d2fd2e0c2f332a27988df75659c42e4
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92078
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6292
https://bugs.php.net/72618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-6294 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92115
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6294
https://bugs.php.net/72533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-6295 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=cab1c3b3708eead315e033359d07049b23b147a3
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92094
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6295
https://bugs.php.net/72479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-6296 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e6c48213c22ed50b2b987b479fcc1ac709394caa
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92095
http://www.securitytracker.com/id/1036430
http://www.ubuntu.com/usn/USN-3059-1
https://access.redhat.com/security/cve/CVE-2016-6296
https://bugs.php.net/72606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296
https://lists.debian.org/debian-lts-announce/2019/11/msg00029.html
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
https://ubuntu.com/security/notices/USN-3059-1
php5-mysql CVE-2016-6297 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities
http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92099
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6297
https://bugs.php.net/72520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-7127 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92757
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7127
https://bugs.php.net/bug.php?id=72730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
https://github.com/php/php-src/commit/1bd103df00f49cf4d4ade2cfe3f456ac058a4eae?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-7129 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92758
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7129
https://bugs.php.net/bug.php?id=72749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
https://github.com/php/php-src/commit/426aeb2808955ee3d3f52e0cfb102834cdb836a5?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-7130 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92764
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7130
https://bugs.php.net/bug.php?id=72750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130
https://github.com/php/php-src/commit/698a691724c0a949295991e5df091ce16f899e02?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-7131 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92768
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7131
https://bugs.php.net/bug.php?id=72790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131
https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-7132 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92767
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7132
https://bugs.php.net/bug.php?id=72799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132
https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-7411 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/93009
http://www.securitytracker.com/id/1036836
https://access.redhat.com/security/cve/CVE-2016-7411
https://bugs.php.net/bug.php?id=73052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411
https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
php5-mysql CVE-2016-7412 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93005
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7412
https://bugs.php.net/bug.php?id=72293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412
https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-7413 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93006
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7413
https://bugs.php.net/bug.php?id=72860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413
https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-7414 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93004
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7414
https://bugs.php.net/bug.php?id=72928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414
https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-7417 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93007
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7417
https://bugs.php.net/bug.php?id=73029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417
https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-7478 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7
http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
http://www.securityfocus.com/bid/95150
https://access.redhat.com/security/cve/CVE-2016-7478
https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
https://bugs.php.net/bug.php?id=73093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://www.youtube.com/watch?v=LDcaPstAuPk
php5-mysql CVE-2016-7479 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7
http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
http://www.securityfocus.com/bid/95151
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7479
https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
https://bugs.php.net/bug.php?id=73092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.youtube.com/watch?v=LDcaPstAuPk
php5-mysql CVE-2016-9934 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.openwall.com/lists/oss-security/2016/12/12/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/94845
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-9934
https://bugs.php.net/bug.php?id=73331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d
https://ubuntu.com/security/notices/USN-3196-1
php5-mysql CVE-2016-9935 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.debian.org/security/2016/dsa-3737
http://www.openwall.com/lists/oss-security/2016/12/12/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/94846
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-9935
https://bugs.php.net/bug.php?id=73631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
https://security.gentoo.org/glsa/201702-29
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
php5-mysql CVE-2017-11143 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/99553
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11143
https://bugs.php.net/bug.php?id=74145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143
https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
php5-mysql CVE-2017-11144 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=73cabfedf519298e1a11192699f44d53c529315e
http://git.php.net/?p=php-src.git;a=commit;h=89637c6b41b510c20d262c17483f582f115c66d6
http://git.php.net/?p=php-src.git;a=commit;h=91826a311dd37f4c4e5d605fa7af331e80ddd4c3
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11144
https://bugs.php.net/bug.php?id=74651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
php5-mysql CVE-2017-11145 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e8b7698f5ee757ce2c8bd10a192a491a498f891c
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99550
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11145
https://bugs.php.net/bug.php?id=74819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145
https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
php5-mysql CVE-2017-11147 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99607
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11147
https://bugs.php.net/bug.php?id=73773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11147
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.tenable.com/security/tns-2017-12
php5-mysql CVE-2017-11628 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e
http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c
http://www.securityfocus.com/bid/99489
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11628
https://bugs.php.net/bug.php?id=74603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628
https://security.gentoo.org/glsa/201709-21
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
php5-mysql CVE-2017-9224 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/101244
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224
https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b
https://github.com/kkos/oniguruma/issues/57
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-mysql CVE-2017-9226 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/101244
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226
https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
https://github.com/kkos/oniguruma/issues/55
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-mysql CVE-2017-9227 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/100538
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227
https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814
https://github.com/kkos/oniguruma/issues/58
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-mysql CVE-2017-9228 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228
https://github.com/kkos/oniguruma/commit/3b63d12038c8d8fc278e81c942fa9bec7c704c8b
https://github.com/kkos/oniguruma/issues/60
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-mysql CVE-2017-9229 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229
https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d
https://github.com/kkos/oniguruma/issues/59
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-mysql CVE-2018-10545 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104022
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10545
https://bugs.php.net/bug.php?id=75605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10545
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
php5-mysql CVE-2018-10546 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104019
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10546
https://bugs.php.net/bug.php?id=76249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://usn.ubuntu.com/3646-1/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
php5-mysql CVE-2018-10547 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10547
https://bugs.php.net/bug.php?id=76129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547
https://linux.oracle.com/cve/CVE-2018-10547.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
php5-mysql CVE-2018-10548 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104019
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10548
https://bugs.php.net/bug.php?id=76248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
https://www.tenable.com/security/tns-2019-07
php5-mysql CVE-2018-14883 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104871
https://access.redhat.com/security/cve/CVE-2018-14883
https://bugs.php.net/bug.php?id=76423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883
https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html
https://security.netapp.com/advisory/ntap-20181107-0003/
https://ubuntu.com/security/notices/USN-3766-1
https://ubuntu.com/security/notices/USN-3766-2
https://usn.ubuntu.com/3766-1/
https://usn.ubuntu.com/3766-2/
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2018-12
php5-mysql CVE-2018-17082 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-17082
https://bugs.php.net/bug.php?id=76582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082
https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e
https://lists.debian.org/debian-lts-announce/2018/09/msg00020.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180924-0001/
https://ubuntu.com/security/notices/USN-3766-1
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2019-07
php5-mysql CVE-2018-5712 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/102742
http://www.securityfocus.com/bid/104020
http://www.securitytracker.com/id/1040363
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-5712
https://bugs.php.net/bug.php?id=74782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712
https://linux.oracle.com/cve/CVE-2018-5712.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html
https://ubuntu.com/security/notices/USN-3566-1
https://ubuntu.com/security/notices/USN-3600-1
https://ubuntu.com/security/notices/USN-3600-2
https://usn.ubuntu.com/3566-1/
https://usn.ubuntu.com/3600-1/
https://usn.ubuntu.com/3600-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
php5-mysql CVE-2018-7584 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.24
Expand...http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/103204
http://www.securitytracker.com/id/1041607
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-7584
https://bugs.php.net/bug.php?id=75981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584
https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
https://linux.oracle.com/cve/CVE-2018-7584.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://ubuntu.com/security/notices/USN-3600-1
https://ubuntu.com/security/notices/USN-3600-2
https://usn.ubuntu.com/3600-1/
https://usn.ubuntu.com/3600-2/
https://www.debian.org/security/2018/dsa-4240
https://www.exploit-db.com/exploits/44846/
https://www.tenable.com/security/tns-2018-03
https://www.tenable.com/security/tns-2018-12
php5-mysql CVE-2019-9020 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9020
https://bugs.php.net/bug.php?id=77242
https://bugs.php.net/bug.php?id=77249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020
https://linux.oracle.com/cve/CVE-2019-9020.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-mysql CVE-2019-9021 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/106747
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9021
https://bugs.php.net/bug.php?id=77247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9021
https://linux.oracle.com/cve/CVE-2019-9021.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-mysql CVE-2019-9022 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9022
https://bugs.php.net/bug.php?id=77369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9022
https://linux.oracle.com/cve/CVE-2019-9022.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4398
https://www.tenable.com/security/tns-2019-07
php5-mysql CVE-2019-9023 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9023
https://bugs.php.net/bug.php?id=77370
https://bugs.php.net/bug.php?id=77371
https://bugs.php.net/bug.php?id=77381
https://bugs.php.net/bug.php?id=77382
https://bugs.php.net/bug.php?id=77385
https://bugs.php.net/bug.php?id=77394
https://bugs.php.net/bug.php?id=77418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023
https://linux.oracle.com/cve/CVE-2019-9023.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://support.f5.com/csp/article/K06372014
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-mysql CVE-2019-9024 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9024
https://bugs.php.net/bug.php?id=77380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024
https://linux.oracle.com/cve/CVE-2019-9024.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-mysql CVE-2019-9638 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9638
https://bugs.php.net/bug.php?id=77563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638
https://linux.oracle.com/cve/CVE-2019-9638.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-mysql CVE-2019-9639 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9639
https://bugs.php.net/bug.php?id=77659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639
https://linux.oracle.com/cve/CVE-2019-9639.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-mysql CVE-2019-9640 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9640
https://bugs.php.net/bug.php?id=77540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640
https://linux.oracle.com/cve/CVE-2019-9640.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-mysql CVE-2019-9641 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2019-9641
https://bugs.php.net/bug.php?id=77509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-mysql CVE-2014-9767 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/16/20
http://www.securityfocus.com/bid/76652
http://www.securitytracker.com/id/1035311
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2014-9767
https://bugs.php.net/bug.php?id=67996
https://bugs.php.net/bug.php?id=70350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9767
https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686
https://ubuntu.com/security/notices/USN-2952-1
php5-mysql CVE-2014-9912 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://www.openwall.com/lists/oss-security/2016/11/25/1
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/68549
https://access.redhat.com/security/cve/CVE-2014-9912
https://bugs.php.net/bug.php?id=67397
https://bugzilla.redhat.com/show_bug.cgi?id=1383569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9912
https://marc.info/?l=oss-security&m=148003512008712&w=2
https://ubuntu.com/security/notices/USN-3196-1
php5-mysql CVE-2015-4116 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=1cbd25ca15383394ffa9ee8601c5de4c0f2f90e1
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
https://access.redhat.com/security/cve/CVE-2015-4116
https://bugs.php.net/bug.php?id=69737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116
https://ubuntu.com/security/notices/USN-3045-1
https://www.htbridge.com/advisory/HTB23262
php5-mysql CVE-2015-8865 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://bugs.gw.com/view.php?id=522
http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85802
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8865
https://bugs.php.net/bug.php?id=71527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
php5-mysql CVE-2015-8873 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=4d2278143a08b7522de9471d0f014d7357c28fea
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
https://access.redhat.com/security/cve/CVE-2015-8873
https://bugs.php.net/bug.php?id=69793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8873
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2015-8994 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://marc.info/?l=php-internals&m=147876797317925&w=2
http://marc.info/?l=php-internals&m=147921016724565&w=2
http://openwall.com/lists/oss-security/2017/02/28/1
http://seclists.org/oss-sec/2016/q4/343
http://seclists.org/oss-sec/2017/q1/520
https://access.redhat.com/security/cve/CVE-2015-8994
https://bugs.php.net/bug.php?id=69090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8994
https://ma.ttias.be/a-better-way-to-run-php-fpm/
https://ubuntu.com/security/notices/USN-3382-1
php5-mysql CVE-2016-10158 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95764
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10158
https://bugs.php.net/bug.php?id=73737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158
https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-mysql CVE-2016-10159 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95774
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10159
https://bugs.php.net/bug.php?id=73764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159
https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-mysql CVE-2016-10161 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95768
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10161
https://bugs.php.net/bug.php?id=73825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161
https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-mysql CVE-2016-10712 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.24
Expand...https://access.redhat.com/security/cve/CVE-2016-10712
https://bugs.php.net/bug.php?id=71323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10712
https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5
https://ubuntu.com/security/notices/USN-3566-2
https://ubuntu.com/security/notices/USN-3600-1
https://usn.ubuntu.com/3566-2/
https://usn.ubuntu.com/3600-1/
php5-mysql CVE-2016-1903 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/01/14/8
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/79916
http://www.securitytracker.com/id/1034608
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-1903
https://bugs.php.net/bug.php?id=70976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-2952-1
php5-mysql CVE-2016-3142 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/10/5
http://www.openwall.com/lists/oss-security/2016/03/13/2
http://www.securitytracker.com/id/1035255
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3142
https://bugs.php.net/bug.php?id=71498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142
https://git.php.net/?p=php-src.git;a=commit;h=a6fdc5bb27b20d889de0cd29318b3968aabb57bd
https://php.net/ChangeLog-5.php
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
php5-mysql CVE-2016-4537 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90173
https://access.redhat.com/security/cve/CVE-2016-4537
https://bugs.php.net/bug.php?id=72093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537
https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-mysql CVE-2016-4540 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90172
https://access.redhat.com/security/cve/CVE-2016-4540
https://bugs.php.net/bug.php?id=72061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540
https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-mysql CVE-2016-4541 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90172
https://access.redhat.com/security/cve/CVE-2016-4541
https://bugs.php.net/bug.php?id=72061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541
https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-mysql CVE-2016-4542 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4542
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-mysql CVE-2016-4543 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4543
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-mysql CVE-2016-4544 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4544
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-mysql CVE-2016-5093 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90946
https://access.redhat.com/security/cve/CVE-2016-5093
https://bugs.php.net/bug.php?id=72241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
https://github.com/php/php-src/commit/97eff7eb57fc2320c267a949cffd622c38712484?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-5094 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90857
https://access.redhat.com/security/cve/CVE-2016-5094
https://bugs.php.net/bug.php?id=72135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
https://github.com/php/php-src/commit/0da8b8b801f9276359262f1ef8274c7812d3dfda?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-5095 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/92144
https://access.redhat.com/security/cve/CVE-2016-5095
https://bugs.php.net/bug.php?id=72135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095
https://gist.github.com/8ef775c117d84ff15185953990a28576
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-5096 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90861
https://access.redhat.com/security/cve/CVE-2016-5096
https://bugs.php.net/bug.php?id=72114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
https://github.com/php/php-src/commit/abd159cce48f3e34f08e4751c568e09677d5ec9c?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-5114 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://seclists.org/bugtraq/2016/Jan/117
http://www.openwall.com/lists/oss-security/2016/02/02/4
http://www.openwall.com/lists/oss-security/2016/05/29/1
http://www.search-lab.hu/about-us/news/111-some-unusual-vulnerabilities-in-the-php-engine
https://access.redhat.com/security/cve/CVE-2016-5114
https://bugs.php.net/bug.php?id=70755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-5771 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91401
https://access.redhat.com/security/cve/CVE-2016-5771
https://bugs.php.net/bug.php?id=72433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-mysql CVE-2016-5773 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91397
https://access.redhat.com/security/cve/CVE-2016-5773
https://bugs.php.net/bug.php?id=72434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
https://www.evonide.com/breaking-phps-garbage-collection-and-unserialize/
php5-mysql CVE-2016-7124 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92756
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7124
https://bugs.php.net/bug.php?id=72663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124
https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-7125 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92552
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7125
https://bugs.php.net/bug.php?id=72681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125
https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-7128 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92564
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7128
https://bugs.php.net/bug.php?id=72627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128
https://github.com/php/php-src/commit/6dbb1ee46b5f4725cc6519abf91e512a2a10dfed?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-7416 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93008
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7416
https://bugs.php.net/bug.php?id=73007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416
https://github.com/php/php-src/commit/6d55ba265637d6adf0ba7e9c9ef11187d1ec2f5b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-7418 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93011
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7418
https://bugs.php.net/bug.php?id=73065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418
https://github.com/php/php-src/commit/c4cca4c20e75359c9a13a1f9a36cb7b4e9601d29?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2016-9137 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f
http://www.debian.org/security/2016/dsa-3698
http://www.openwall.com/lists/oss-security/2016/10/18/1
http://www.openwall.com/lists/oss-security/2016/11/01/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93577
https://access.redhat.com/security/cve/CVE-2016-9137
https://bugs.php.net/bug.php?id=73147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2016-19
php5-mysql CVE-2017-11362 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11362
https://bugs.php.net/bug.php?id=73473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11362
https://security.gentoo.org/glsa/201709-21
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3566-2
https://usn.ubuntu.com/3566-2/
php5-mysql CVE-2017-12933 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99490
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-12933
https://bugs.php.net/bug.php?id=74111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933
https://ubuntu.com/security/notices/USN-3566-1
https://ubuntu.com/security/notices/USN-3566-2
https://usn.ubuntu.com/3566-1/
https://usn.ubuntu.com/3566-2/
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
php5-mysql CVE-2017-16642 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/101745
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2017-16642
https://bugs.php.net/bug.php?id=75055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642
https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
https://security.netapp.com/advisory/ntap-20181123-0001/
https://ubuntu.com/security/notices/USN-3566-1
https://usn.ubuntu.com/3566-1/
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.exploit-db.com/exploits/43133/
php5-mysql CVE-2018-14851 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104871
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-14851
https://bugs.php.net/bug.php?id=76557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851
https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html
https://security.netapp.com/advisory/ntap-20181107-0003/
https://ubuntu.com/security/notices/USN-3766-1
https://ubuntu.com/security/notices/USN-3766-2
https://usn.ubuntu.com/3766-1/
https://usn.ubuntu.com/3766-2/
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2018-12
php5-mysql CVE-2019-9637 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9637
https://bugs.php.net/bug.php?id=77630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637
https://linux.oracle.com/cve/CVE-2019-9637.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://support.f5.com/csp/article/K53825211
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
https://www.tenable.com/security/tns-2019-07
php5-mysql CVE-2019-9675 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://php.net/ChangeLog-7.php
https://access.redhat.com/security/cve/CVE-2019-9675
https://bugs.php.net/bug.php?id=77586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
php5-readline CVE-2015-8835 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.securityfocus.com/bid/84426
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8835
https://bugs.php.net/bug.php?id=70081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835
https://ubuntu.com/security/notices/USN-2952-1
php5-readline CVE-2015-8838 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=97aa752fee61fccdec361279adbfb17a3c60f3f4
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8838
https://bugs.php.net/bug.php?id=69669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8838
https://ubuntu.com/security/notices/USN-2952-1
php5-readline CVE-2015-8866 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://framework.zend.com/security/advisory/ZF2015-06 -> Relation to CVE-2015-5161
http://git.php.net/?p=php-src.git;a=commit;h=de31324c221c1791b26350ba106cc26bad23ace9
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/21/8
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/87470
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8866
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817
https://bugs.php.net/bug.php?id=64938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866
https://ubuntu.com/security/notices/USN-2952-1
php5-readline CVE-2015-8867 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/21/8
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8867
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1534203
https://bugs.php.net/bug.php?id=70014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8867
https://ubuntu.com/security/notices/USN-2952-1
php5-readline CVE-2015-8876 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.php.net/ChangeLog-5.php
https://access.redhat.com/security/cve/CVE-2015-8876
https://bugs.php.net/bug.php?id=70121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8876
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2015-8935 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/06/20/3
https://access.redhat.com/security/cve/CVE-2015-8935
https://bugs.php.net/bug.php?id=68978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8935
https://github.com/php/php-src/commit/996faf964bba1aec06b153b370a7f20d3dd2bb8b?w=1
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-10160 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95783
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10160
https://bugs.php.net/bug.php?id=73768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160
https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-readline CVE-2016-10397 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99552
https://access.redhat.com/security/cve/CVE-2016-10397
https://bugs.php.net/bug.php?id=73192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10397
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-readline CVE-2016-2554 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/02/22/5
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-2554
https://bugs.php.net/bug.php?id=71488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-2952-1
php5-readline CVE-2016-3141 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://git.php.net/?p=php-src.git;a=commit;h=b1bd4119bcafab6f9a8f84d92cd65eec3afeface
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/10/5
http://www.openwall.com/lists/oss-security/2016/03/13/1
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
http://www.securityfocus.com/bid/84271
http://www.securitytracker.com/id/1035255
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3141
https://bugs.php.net/bug.php?id=71587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141
https://php.net/ChangeLog-5.php
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
php5-readline CVE-2016-3185 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://php.net/ChangeLog-7.php#7.0.4
http://www.securityfocus.com/bid/84307
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3185
https://bugs.php.net/bug.php?id=70081
https://bugs.php.net/bug.php?id=71610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3185
https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba
https://secure.php.net/ChangeLog-5.php#5.6.12
https://ubuntu.com/security/notices/USN-2952-1
php5-readline CVE-2016-4070 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85801
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4070
https://bugs.php.net/bug.php?id=71798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070
https://git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
php5-readline CVE-2016-4071 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85800
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4071
https://bugs.php.net/bug.php?id=71704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4071
https://git.php.net/?p=php-src.git;a=commit;h=6e25966544fb1d2f3d7596e060ce9c9269bbdcf8
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://www.exploit-db.com/exploits/39645/
php5-readline CVE-2016-4072 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85993
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4072
https://bugs.php.net/bug.php?id=71860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4072
https://gist.github.com/smalyshev/80b5c2909832872f2ba2
https://git.php.net/?p=php-src.git;a=commit;h=1e9b175204e3286d64dfd6c9f09151c31b5e099a
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
php5-readline CVE-2016-4073 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85991
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-4073
https://bugs.php.net/bug.php?id=71906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4073
https://gist.github.com/smalyshev/d8355c96a657cc5dba70
https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
php5-readline CVE-2016-4342 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/28/2
http://www.securityfocus.com/bid/89154
https://access.redhat.com/security/cve/CVE-2016-4342
https://bugs.php.net/bug.php?id=71354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://ubuntu.com/security/notices/USN-2984-1
php5-readline CVE-2016-4343 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/04/28/2
http://www.securityfocus.com/bid/89179
https://access.redhat.com/security/cve/CVE-2016-4343
https://bugs.php.net/bug.php?id=71331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4343
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://ubuntu.com/security/notices/USN-2984-1
php5-readline CVE-2016-4538 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90173
https://access.redhat.com/security/cve/CVE-2016-4538
https://bugs.php.net/bug.php?id=72093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538
https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-readline CVE-2016-4539 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90174
https://access.redhat.com/security/cve/CVE-2016-4539
https://bugs.php.net/bug.php?id=72099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539
https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-readline CVE-2016-5385 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-7.php#7.0.9
http://rhn.redhat.com/errata/RHSA-2016-1609.html
http://rhn.redhat.com/errata/RHSA-2016-1610.html
http://rhn.redhat.com/errata/RHSA-2016-1611.html
http://rhn.redhat.com/errata/RHSA-2016-1612.html
http://rhn.redhat.com/errata/RHSA-2016-1613.html
http://www.debian.org/security/2016/dsa-3631
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91821
http://www.securitytracker.com/id/1036335
https://access.redhat.com/security/cve/CVE-2016-5385
https://bugzilla.redhat.com/show_bug.cgi?id=1353794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385
https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml
https://github.com/advisories/GHSA-m6ch-gg5f-wxx3
https://github.com/guzzle/guzzle/releases/tag/6.2.1
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5385.html
https://linux.oracle.com/errata/ELSA-2016-1613.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/
https://nvd.nist.gov/vuln/detail/CVE-2016-5385
https://security.gentoo.org/glsa/201611-22
https://typo3.org/security/advisory/typo3-core-sa-2016-019
https://ubuntu.com/security/notices/USN-3045-1
https://www.drupal.org/SA-CORE-2016-003
php5-readline CVE-2016-5399 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://php.net/ChangeLog-7.php#7.0.9
http://rhn.redhat.com/errata/RHSA-2016-2598.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://seclists.org/fulldisclosure/2016/Jul/72
http://www.debian.org/security/2016/dsa-3631
http://www.openwall.com/lists/oss-security/2016/07/21/1
http://www.securityfocus.com/archive/1/538966/100/0/threaded
http://www.securityfocus.com/bid/92051
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-5399
https://bugs.php.net/bug.php?id=72613
https://bugzilla.redhat.com/show_bug.cgi?id=1358395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399
https://linux.oracle.com/cve/CVE-2016-5399.html
https://linux.oracle.com/errata/ELSA-2016-2598.html
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3045-1
https://www.exploit-db.com/exploits/40155/
php5-readline CVE-2016-5768 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/5b597a2e5b28e2d5a52fc1be13f425f08f47cb62?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2598.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91396
https://access.redhat.com/security/cve/CVE-2016-5768
https://bugs.php.net/bug.php?id=72402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://linux.oracle.com/cve/CVE-2016-5768.html
https://linux.oracle.com/errata/ELSA-2016-2598.html
https://marc.info/?l=oss-security&m=146668499803695&w=2
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-5769 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/6c5211a0cef0cc2854eaa387e0eb036e012904d0?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91399
https://access.redhat.com/security/cve/CVE-2016-5769
https://bugs.php.net/bug.php?id=72455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://marc.info/?l=oss-security&m=146668499803695&w=2
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-5772 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91398
https://access.redhat.com/security/cve/CVE-2016-5772
https://bugs.php.net/bug.php?id=72340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-6288 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=629e4da7cc8b174acdeab84969cbfc606a019b31
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.securityfocus.com/bid/92111
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6288
https://bugs.php.net/70480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-6289 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities
http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92074
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6289
https://bugs.php.net/72513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-6290 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=3798eb6fd5dddb211b01d41495072fd9858d4e32
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92097
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6290
https://bugs.php.net/72562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-6291 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=eebcbd5de38a0f1c2876035402cb770e37476519
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92073
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6291
https://bugs.php.net/72603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-6292 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=41131cd41d2fd2e0c2f332a27988df75659c42e4
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92078
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6292
https://bugs.php.net/72618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-6294 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92115
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6294
https://bugs.php.net/72533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-6295 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=cab1c3b3708eead315e033359d07049b23b147a3
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92094
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6295
https://bugs.php.net/72479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-6296 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e6c48213c22ed50b2b987b479fcc1ac709394caa
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92095
http://www.securitytracker.com/id/1036430
http://www.ubuntu.com/usn/USN-3059-1
https://access.redhat.com/security/cve/CVE-2016-6296
https://bugs.php.net/72606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296
https://lists.debian.org/debian-lts-announce/2019/11/msg00029.html
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
https://ubuntu.com/security/notices/USN-3059-1
php5-readline CVE-2016-6297 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities
http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://openwall.com/lists/oss-security/2016/07/24/2
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3631
http://www.securityfocus.com/bid/92099
http://www.securitytracker.com/id/1036430
https://access.redhat.com/security/cve/CVE-2016-6297
https://bugs.php.net/72520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297
https://security.gentoo.org/glsa/201611-22
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-7127 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92757
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7127
https://bugs.php.net/bug.php?id=72730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
https://github.com/php/php-src/commit/1bd103df00f49cf4d4ade2cfe3f456ac058a4eae?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-7129 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92758
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7129
https://bugs.php.net/bug.php?id=72749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
https://github.com/php/php-src/commit/426aeb2808955ee3d3f52e0cfb102834cdb836a5?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-7130 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92764
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7130
https://bugs.php.net/bug.php?id=72750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130
https://github.com/php/php-src/commit/698a691724c0a949295991e5df091ce16f899e02?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-7131 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92768
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7131
https://bugs.php.net/bug.php?id=72790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131
https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-7132 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92767
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7132
https://bugs.php.net/bug.php?id=72799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132
https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-7411 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/93009
http://www.securitytracker.com/id/1036836
https://access.redhat.com/security/cve/CVE-2016-7411
https://bugs.php.net/bug.php?id=73052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411
https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
php5-readline CVE-2016-7412 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93005
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7412
https://bugs.php.net/bug.php?id=72293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412
https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-7413 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93006
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7413
https://bugs.php.net/bug.php?id=72860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413
https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-7414 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93004
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7414
https://bugs.php.net/bug.php?id=72928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414
https://github.com/php/php-src/commit/0bfb970f43acd1e81d11be1154805f86655f15d5?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-7417 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93007
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7417
https://bugs.php.net/bug.php?id=73029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417
https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-7478 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7
http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
http://www.securityfocus.com/bid/95150
https://access.redhat.com/security/cve/CVE-2016-7478
https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
https://bugs.php.net/bug.php?id=73093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://www.youtube.com/watch?v=LDcaPstAuPk
php5-readline CVE-2016-7479 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7
http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
http://www.securityfocus.com/bid/95151
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7479
https://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
https://bugs.php.net/bug.php?id=73092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.youtube.com/watch?v=LDcaPstAuPk
php5-readline CVE-2016-9934 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.openwall.com/lists/oss-security/2016/12/12/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/94845
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-9934
https://bugs.php.net/bug.php?id=73331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d
https://ubuntu.com/security/notices/USN-3196-1
php5-readline CVE-2016-9935 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.debian.org/security/2016/dsa-3737
http://www.openwall.com/lists/oss-security/2016/12/12/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/94846
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-9935
https://bugs.php.net/bug.php?id=73631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
https://security.gentoo.org/glsa/201702-29
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
php5-readline CVE-2017-11143 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/99553
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11143
https://bugs.php.net/bug.php?id=74145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143
https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
php5-readline CVE-2017-11144 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=73cabfedf519298e1a11192699f44d53c529315e
http://git.php.net/?p=php-src.git;a=commit;h=89637c6b41b510c20d262c17483f582f115c66d6
http://git.php.net/?p=php-src.git;a=commit;h=91826a311dd37f4c4e5d605fa7af331e80ddd4c3
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11144
https://bugs.php.net/bug.php?id=74651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
php5-readline CVE-2017-11145 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e8b7698f5ee757ce2c8bd10a192a491a498f891c
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99550
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11145
https://bugs.php.net/bug.php?id=74819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145
https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.tenable.com/security/tns-2017-12
php5-readline CVE-2017-11147 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=e5246580a85f031e1a3b8064edbaa55c1643a451
http://openwall.com/lists/oss-security/2017/07/10/6
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99607
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11147
https://bugs.php.net/bug.php?id=73773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11147
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.tenable.com/security/tns-2017-12
php5-readline CVE-2017-11628 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e
http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c
http://www.securityfocus.com/bid/99489
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11628
https://bugs.php.net/bug.php?id=74603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628
https://security.gentoo.org/glsa/201709-21
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
php5-readline CVE-2017-9224 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/101244
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224
https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b
https://github.com/kkos/oniguruma/issues/57
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-readline CVE-2017-9226 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/101244
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226
https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
https://github.com/kkos/oniguruma/issues/55
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-readline CVE-2017-9227 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://www.securityfocus.com/bid/100538
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227
https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814
https://github.com/kkos/oniguruma/issues/58
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-readline CVE-2017-9228 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228
https://github.com/kkos/oniguruma/commit/3b63d12038c8d8fc278e81c942fa9bec7c704c8b
https://github.com/kkos/oniguruma/issues/60
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-readline CVE-2017-9229 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-9229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229
https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d
https://github.com/kkos/oniguruma/issues/59
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3382-2
php5-readline CVE-2018-10545 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104022
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10545
https://bugs.php.net/bug.php?id=75605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10545
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
php5-readline CVE-2018-10546 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104019
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10546
https://bugs.php.net/bug.php?id=76249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://usn.ubuntu.com/3646-1/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
php5-readline CVE-2018-10547 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10547
https://bugs.php.net/bug.php?id=76129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547
https://linux.oracle.com/cve/CVE-2018-10547.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
php5-readline CVE-2018-10548 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.25
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104019
http://www.securitytracker.com/id/1040807
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-10548
https://bugs.php.net/bug.php?id=76248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180607-0003/
https://ubuntu.com/security/notices/USN-3646-1
https://ubuntu.com/security/notices/USN-3646-2
https://usn.ubuntu.com/3646-1/
https://usn.ubuntu.com/3646-2/
https://www.debian.org/security/2018/dsa-4240
https://www.tenable.com/security/tns-2018-12
https://www.tenable.com/security/tns-2019-07
php5-readline CVE-2018-14883 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104871
https://access.redhat.com/security/cve/CVE-2018-14883
https://bugs.php.net/bug.php?id=76423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883
https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html
https://security.netapp.com/advisory/ntap-20181107-0003/
https://ubuntu.com/security/notices/USN-3766-1
https://ubuntu.com/security/notices/USN-3766-2
https://usn.ubuntu.com/3766-1/
https://usn.ubuntu.com/3766-2/
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2018-12
php5-readline CVE-2018-17082 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-17082
https://bugs.php.net/bug.php?id=76582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082
https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e
https://lists.debian.org/debian-lts-announce/2018/09/msg00020.html
https://security.gentoo.org/glsa/201812-01
https://security.netapp.com/advisory/ntap-20180924-0001/
https://ubuntu.com/security/notices/USN-3766-1
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2019-07
php5-readline CVE-2018-5712 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/102742
http://www.securityfocus.com/bid/104020
http://www.securitytracker.com/id/1040363
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-5712
https://bugs.php.net/bug.php?id=74782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712
https://linux.oracle.com/cve/CVE-2018-5712.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html
https://ubuntu.com/security/notices/USN-3566-1
https://ubuntu.com/security/notices/USN-3600-1
https://ubuntu.com/security/notices/USN-3600-2
https://usn.ubuntu.com/3566-1/
https://usn.ubuntu.com/3600-1/
https://usn.ubuntu.com/3600-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
php5-readline CVE-2018-7584 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.24
Expand...http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/103204
http://www.securitytracker.com/id/1041607
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-7584
https://bugs.php.net/bug.php?id=75981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584
https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
https://linux.oracle.com/cve/CVE-2018-7584.html
https://linux.oracle.com/errata/ELSA-2020-1112.html
https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
https://ubuntu.com/security/notices/USN-3600-1
https://ubuntu.com/security/notices/USN-3600-2
https://usn.ubuntu.com/3600-1/
https://usn.ubuntu.com/3600-2/
https://www.debian.org/security/2018/dsa-4240
https://www.exploit-db.com/exploits/44846/
https://www.tenable.com/security/tns-2018-03
https://www.tenable.com/security/tns-2018-12
php5-readline CVE-2019-9020 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9020
https://bugs.php.net/bug.php?id=77242
https://bugs.php.net/bug.php?id=77249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020
https://linux.oracle.com/cve/CVE-2019-9020.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-readline CVE-2019-9021 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/106747
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9021
https://bugs.php.net/bug.php?id=77247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9021
https://linux.oracle.com/cve/CVE-2019-9021.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-readline CVE-2019-9022 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9022
https://bugs.php.net/bug.php?id=77369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9022
https://linux.oracle.com/cve/CVE-2019-9022.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4398
https://www.tenable.com/security/tns-2019-07
php5-readline CVE-2019-9023 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9023
https://bugs.php.net/bug.php?id=77370
https://bugs.php.net/bug.php?id=77371
https://bugs.php.net/bug.php?id=77381
https://bugs.php.net/bug.php?id=77382
https://bugs.php.net/bug.php?id=77385
https://bugs.php.net/bug.php?id=77394
https://bugs.php.net/bug.php?id=77418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023
https://linux.oracle.com/cve/CVE-2019-9023.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://support.f5.com/csp/article/K06372014
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-readline CVE-2019-9024 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.27
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://www.securityfocus.com/bid/107156
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9024
https://bugs.php.net/bug.php?id=77380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024
https://linux.oracle.com/cve/CVE-2019-9024.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://security.netapp.com/advisory/ntap-20190321-0001/
https://ubuntu.com/security/notices/USN-3902-1
https://ubuntu.com/security/notices/USN-3902-2
https://usn.ubuntu.com/3902-1/
https://usn.ubuntu.com/3902-2/
https://www.debian.org/security/2019/dsa-4398
php5-readline CVE-2019-9638 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9638
https://bugs.php.net/bug.php?id=77563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638
https://linux.oracle.com/cve/CVE-2019-9638.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-readline CVE-2019-9639 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9639
https://bugs.php.net/bug.php?id=77659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639
https://linux.oracle.com/cve/CVE-2019-9639.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-readline CVE-2019-9640 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9640
https://bugs.php.net/bug.php?id=77540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640
https://linux.oracle.com/cve/CVE-2019-9640.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-readline CVE-2019-9641 MEDIUM 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2019-9641
https://bugs.php.net/bug.php?id=77509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
php5-readline CVE-2014-9767 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/16/20
http://www.securityfocus.com/bid/76652
http://www.securitytracker.com/id/1035311
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2014-9767
https://bugs.php.net/bug.php?id=67996
https://bugs.php.net/bug.php?id=70350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9767
https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686
https://ubuntu.com/security/notices/USN-2952-1
php5-readline CVE-2014-9912 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://www.openwall.com/lists/oss-security/2016/11/25/1
http://www.php.net/ChangeLog-5.php
http://www.securityfocus.com/bid/68549
https://access.redhat.com/security/cve/CVE-2014-9912
https://bugs.php.net/bug.php?id=67397
https://bugzilla.redhat.com/show_bug.cgi?id=1383569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9912
https://marc.info/?l=oss-security&m=148003512008712&w=2
https://ubuntu.com/security/notices/USN-3196-1
php5-readline CVE-2015-4116 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=1cbd25ca15383394ffa9ee8601c5de4c0f2f90e1
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
https://access.redhat.com/security/cve/CVE-2015-4116
https://bugs.php.net/bug.php?id=69737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116
https://ubuntu.com/security/notices/USN-3045-1
https://www.htbridge.com/advisory/HTB23262
php5-readline CVE-2015-8865 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://bugs.gw.com/view.php?id=522
http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85802
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8865
https://bugs.php.net/bug.php?id=71527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
php5-readline CVE-2015-8873 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://git.php.net/?p=php-src.git;a=commit;h=4d2278143a08b7522de9471d0f014d7357c28fea
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
https://access.redhat.com/security/cve/CVE-2015-8873
https://bugs.php.net/bug.php?id=69793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8873
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2015-8994 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...http://marc.info/?l=php-internals&m=147876797317925&w=2
http://marc.info/?l=php-internals&m=147921016724565&w=2
http://openwall.com/lists/oss-security/2017/02/28/1
http://seclists.org/oss-sec/2016/q4/343
http://seclists.org/oss-sec/2017/q1/520
https://access.redhat.com/security/cve/CVE-2015-8994
https://bugs.php.net/bug.php?id=69090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8994
https://ma.ttias.be/a-better-way-to-run-php-fpm/
https://ubuntu.com/security/notices/USN-3382-1
php5-readline CVE-2016-10158 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95764
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10158
https://bugs.php.net/bug.php?id=73737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158
https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-readline CVE-2016-10159 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95774
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10159
https://bugs.php.net/bug.php?id=73764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159
https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-readline CVE-2016-10161 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.debian.org/security/2017/dsa-3783
http://www.securityfocus.com/bid/95768
http://www.securitytracker.com/id/1037659
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-10161
https://bugs.php.net/bug.php?id=73825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161
https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2
https://security.gentoo.org/glsa/201702-29
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2017-04
php5-readline CVE-2016-10712 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.24
Expand...https://access.redhat.com/security/cve/CVE-2016-10712
https://bugs.php.net/bug.php?id=71323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10712
https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5
https://ubuntu.com/security/notices/USN-3566-2
https://ubuntu.com/security/notices/USN-3600-1
https://usn.ubuntu.com/3566-2/
https://usn.ubuntu.com/3600-1/
php5-readline CVE-2016-1903 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.opensuse.org/opensuse-updates/2016-01/msg00099.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00037.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/01/14/8
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/79916
http://www.securitytracker.com/id/1034608
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.461720
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-1903
https://bugs.php.net/bug.php?id=70976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-2952-1
php5-readline CVE-2016-3142 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.16
Expand...http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/03/10/5
http://www.openwall.com/lists/oss-security/2016/03/13/2
http://www.securitytracker.com/id/1035255
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2016-3142
https://bugs.php.net/bug.php?id=71498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142
https://git.php.net/?p=php-src.git;a=commit;h=a6fdc5bb27b20d889de0cd29318b3968aabb57bd
https://php.net/ChangeLog-5.php
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
php5-readline CVE-2016-4537 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90173
https://access.redhat.com/security/cve/CVE-2016-4537
https://bugs.php.net/bug.php?id=72093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537
https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-readline CVE-2016-4540 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90172
https://access.redhat.com/security/cve/CVE-2016-4540
https://bugs.php.net/bug.php?id=72061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540
https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-readline CVE-2016-4541 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/90172
https://access.redhat.com/security/cve/CVE-2016-4541
https://bugs.php.net/bug.php?id=72061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541
https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-readline CVE-2016-4542 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4542
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-readline CVE-2016-4543 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4543
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-readline CVE-2016-4544 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.17
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/05/21
http://www.securityfocus.com/bid/89844
https://access.redhat.com/security/cve/CVE-2016-4544
https://bugs.php.net/bug.php?id=72094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544
https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-2984-1
php5-readline CVE-2016-5093 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90946
https://access.redhat.com/security/cve/CVE-2016-5093
https://bugs.php.net/bug.php?id=72241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
https://github.com/php/php-src/commit/97eff7eb57fc2320c267a949cffd622c38712484?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-5094 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90857
https://access.redhat.com/security/cve/CVE-2016-5094
https://bugs.php.net/bug.php?id=72135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
https://github.com/php/php-src/commit/0da8b8b801f9276359262f1ef8274c7812d3dfda?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-5095 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/92144
https://access.redhat.com/security/cve/CVE-2016-5095
https://bugs.php.net/bug.php?id=72135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095
https://gist.github.com/8ef775c117d84ff15185953990a28576
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-5096 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3602
http://www.openwall.com/lists/oss-security/2016/05/25/3
http://www.openwall.com/lists/oss-security/2016/05/26/3
http://www.securityfocus.com/bid/90861
https://access.redhat.com/security/cve/CVE-2016-5096
https://bugs.php.net/bug.php?id=72114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
https://github.com/php/php-src/commit/abd159cce48f3e34f08e4751c568e09677d5ec9c?w=1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-5114 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://seclists.org/bugtraq/2016/Jan/117
http://www.openwall.com/lists/oss-security/2016/02/02/4
http://www.openwall.com/lists/oss-security/2016/05/29/1
http://www.search-lab.hu/about-us/news/111-some-unusual-vulnerabilities-in-the-php-engine
https://access.redhat.com/security/cve/CVE-2016-5114
https://bugs.php.net/bug.php?id=70755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-5771 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
http://php.net/ChangeLog-5.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91401
https://access.redhat.com/security/cve/CVE-2016-5771
https://bugs.php.net/bug.php?id=72433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
php5-readline CVE-2016-5773 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.19
Expand...http://github.com/php/php-src/commit/f6aef68089221c5ea047d4a74224ee3deead99a6?w=1
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3618
http://www.openwall.com/lists/oss-security/2016/06/23/4
http://www.securityfocus.com/bid/91397
https://access.redhat.com/security/cve/CVE-2016-5773
https://bugs.php.net/bug.php?id=72434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3045-1
https://www.evonide.com/breaking-phps-garbage-collection-and-unserialize/
php5-readline CVE-2016-7124 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92756
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7124
https://bugs.php.net/bug.php?id=72663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124
https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-7125 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92552
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7125
https://bugs.php.net/bug.php?id=72681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125
https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-7128 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://openwall.com/lists/oss-security/2016/09/02/9
http://php.net/ChangeLog-5.php#5.6.25
http://php.net/ChangeLog-7.php#7.0.10
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.openwall.com/lists/oss-security/2016/09/02/5
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92564
http://www.securitytracker.com/id/1036680
https://access.redhat.com/security/cve/CVE-2016-7128
https://bugs.php.net/bug.php?id=72627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128
https://github.com/php/php-src/commit/6dbb1ee46b5f4725cc6519abf91e512a2a10dfed?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-7416 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93008
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7416
https://bugs.php.net/bug.php?id=73007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416
https://github.com/php/php-src/commit/6d55ba265637d6adf0ba7e9c9ef11187d1ec2f5b?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-7418 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.20
Expand...http://php.net/ChangeLog-5.php#5.6.26
http://php.net/ChangeLog-7.php#7.0.11
http://www.openwall.com/lists/oss-security/2016/09/15/10
http://www.openwall.com/lists/oss-security/2016/09/15/6
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93011
http://www.securitytracker.com/id/1036836
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2016-7418
https://bugs.php.net/bug.php?id=73065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418
https://github.com/php/php-src/commit/c4cca4c20e75359c9a13a1f9a36cb7b4e9601d29?w=1
https://security.gentoo.org/glsa/201611-22
https://ubuntu.com/security/notices/USN-3095-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2016-9137 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.21
Expand...http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f
http://www.debian.org/security/2016/dsa-3698
http://www.openwall.com/lists/oss-security/2016/10/18/1
http://www.openwall.com/lists/oss-security/2016/11/01/2
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/93577
https://access.redhat.com/security/cve/CVE-2016-9137
https://bugs.php.net/bug.php?id=73147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137
https://ubuntu.com/security/notices/USN-3196-1
https://ubuntu.com/security/notices/USN-3211-1
https://www.tenable.com/security/tns-2016-19
php5-readline CVE-2017-11362 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.22
Expand...https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-11362
https://bugs.php.net/bug.php?id=73473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11362
https://security.gentoo.org/glsa/201709-21
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3382-1
https://ubuntu.com/security/notices/USN-3566-2
https://usn.ubuntu.com/3566-2/
php5-readline CVE-2017-12933 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/99490
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/security/cve/CVE-2017-12933
https://bugs.php.net/bug.php?id=74111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933
https://ubuntu.com/security/notices/USN-3566-1
https://ubuntu.com/security/notices/USN-3566-2
https://usn.ubuntu.com/3566-1/
https://usn.ubuntu.com/3566-2/
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
php5-readline CVE-2017-16642 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.23
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/101745
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2017-16642
https://bugs.php.net/bug.php?id=75055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642
https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
https://security.netapp.com/advisory/ntap-20181123-0001/
https://ubuntu.com/security/notices/USN-3566-1
https://usn.ubuntu.com/3566-1/
https://www.debian.org/security/2018/dsa-4080
https://www.debian.org/security/2018/dsa-4081
https://www.exploit-db.com/exploits/43133/
php5-readline CVE-2018-14851 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.26
Expand...http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/104871
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/security/cve/CVE-2018-14851
https://bugs.php.net/bug.php?id=76557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851
https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html
https://security.netapp.com/advisory/ntap-20181107-0003/
https://ubuntu.com/security/notices/USN-3766-1
https://ubuntu.com/security/notices/USN-3766-2
https://usn.ubuntu.com/3766-1/
https://usn.ubuntu.com/3766-2/
https://www.debian.org/security/2018/dsa-4353
https://www.tenable.com/security/tns-2018-12
php5-readline CVE-2019-9637 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://access.redhat.com/security/cve/CVE-2019-9637
https://bugs.php.net/bug.php?id=77630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637
https://linux.oracle.com/cve/CVE-2019-9637.html
https://linux.oracle.com/errata/ELSA-2020-1624.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
https://security.netapp.com/advisory/ntap-20190502-0007/
https://support.f5.com/csp/article/K53825211
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-1/
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
https://www.debian.org/security/2019/dsa-4403
https://www.tenable.com/security/tns-2019-07
php5-readline CVE-2019-9675 LOW 5.5.9+dfsg-1ubuntu4.14 5.5.9+dfsg-1ubuntu4.29
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://php.net/ChangeLog-7.php
https://access.redhat.com/security/cve/CVE-2019-9675
https://bugs.php.net/bug.php?id=77586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675
https://ubuntu.com/security/notices/USN-3922-1
https://ubuntu.com/security/notices/USN-3922-2
https://ubuntu.com/security/notices/USN-3922-3
https://usn.ubuntu.com/3922-2/
https://usn.ubuntu.com/3922-3/
procps CVE-2018-1122 MEDIUM 1:3.3.9-1ubuntu2.2 1:3.3.9-1ubuntu2.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/errata/RHSA-2019:2189
https://access.redhat.com/errata/RHSA-2020:0595
https://access.redhat.com/security/cve/CVE-2018-1122
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1122
https://linux.oracle.com/cve/CVE-2018-1122.html
https://linux.oracle.com/errata/ELSA-2019-2189.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://security.gentoo.org/glsa/201805-14
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-3
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-3/
https://www.debian.org/security/2018/dsa-4208
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
procps CVE-2018-1123 MEDIUM 1:3.3.9-1ubuntu2.2 1:3.3.9-1ubuntu2.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1123
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://security.gentoo.org/glsa/201805-14
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-3
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-3/
https://www.debian.org/security/2018/dsa-4208
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
procps CVE-2018-1124 MEDIUM 1:3.3.9-1ubuntu2.2 1:3.3.9-1ubuntu2.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
http://www.securitytracker.com/id/1041057
https://access.redhat.com/errata/RHSA-2018:1700
https://access.redhat.com/errata/RHSA-2018:1777
https://access.redhat.com/errata/RHSA-2018:1820
https://access.redhat.com/errata/RHSA-2018:2267
https://access.redhat.com/errata/RHSA-2018:2268
https://access.redhat.com/errata/RHSA-2019:1944
https://access.redhat.com/errata/RHSA-2019:2401
https://access.redhat.com/security/cve/CVE-2018-1124
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://kc.mcafee.com/corporate/index?page=content&id=SB10241
https://linux.oracle.com/cve/CVE-2018-1124.html
https://linux.oracle.com/errata/ELSA-2018-1777.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://security.gentoo.org/glsa/201805-14
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-2
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-2/
https://www.debian.org/security/2018/dsa-4208
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
procps CVE-2018-1125 MEDIUM 1:3.3.9-1ubuntu2.2 1:3.3.9-1ubuntu2.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1125
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-3
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-3/
https://www.debian.org/security/2018/dsa-4208
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
procps CVE-2018-1126 MEDIUM 1:3.3.9-1ubuntu2.2 1:3.3.9-1ubuntu2.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
http://www.securitytracker.com/id/1041057
https://access.redhat.com/errata/RHSA-2018:1700
https://access.redhat.com/errata/RHSA-2018:1777
https://access.redhat.com/errata/RHSA-2018:1820
https://access.redhat.com/errata/RHSA-2018:2267
https://access.redhat.com/errata/RHSA-2018:2268
https://access.redhat.com/errata/RHSA-2019:1944
https://access.redhat.com/security/cve/CVE-2018-1126
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1126
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-1126.html
https://linux.oracle.com/errata/ELSA-2018-1777.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-2
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-2/
https://www.debian.org/security/2018/dsa-4208
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
python2.7 CVE-2016-0772 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/9
http://www.securityfocus.com/bid/91225
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-0772
https://bugzilla.redhat.com/show_bug.cgi?id=1303647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://hg.python.org/cpython/rev/b3ce713fb9be
https://hg.python.org/cpython/rev/d590114c2394
https://linux.oracle.com/cve/CVE-2016-0772.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
python2.7 CVE-2016-1000110 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2016-1000110
https://bugs.python.org/issue27568
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110
https://linux.oracle.com/cve/CVE-2016-1000110.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/
https://security-tracker.debian.org/tracker/CVE-2016-1000110
https://ubuntu.com/security/notices/USN-3134-1
python2.7 CVE-2016-5636 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-2586.html
http://www.openwall.com/lists/oss-security/2016/06/15/15
http://www.openwall.com/lists/oss-security/2016/06/16/1
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91247
http://www.securitytracker.com/id/1038138
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5636
https://bugs.python.org/issue26171
https://bugs.python.org/msg278228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://linux.oracle.com/cve/CVE-2016-5636.html
https://linux.oracle.com/errata/ELSA-2016-2586.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
python2.7 CVE-2016-5699 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/7
http://www.openwall.com/lists/oss-security/2016/06/15/12
http://www.openwall.com/lists/oss-security/2016/06/16/2
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91226
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5699
https://bugs.python.org/issue22928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4
https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS
https://hg.python.org/cpython/rev/1c45047c5102
https://hg.python.org/cpython/rev/bf3e1c9b80e9
https://linux.oracle.com/cve/CVE-2016-5699.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://ubuntu.com/security/notices/USN-3134-1
python2.7 CVE-2017-1000158 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.4
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.debian.org/security/2018/dsa-4307
python2.7 CVE-2018-1000802 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2018-1000802
https://bugs.python.org/issue34540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802
https://github.com/python/cpython/pull/8985
https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
python2.7 CVE-2018-14647 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securityfocus.com/bid/105396
http://www.securitytracker.com/id/1041740
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:2030
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-14647
https://bugs.python.org/issue34623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647
https://linux.oracle.com/cve/CVE-2018-14647.html
https://linux.oracle.com/errata/ELSA-2019-2030.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
python2.7 CVE-2018-1000030 LOW 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
python2.7 CVE-2018-1060 LOW 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1060
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1060.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
https://www.oracle.com/security-alerts/cpujan2020.html
python2.7 CVE-2018-1061 LOW 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1061
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1061.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
python2.7-minimal CVE-2016-0772 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/9
http://www.securityfocus.com/bid/91225
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-0772
https://bugzilla.redhat.com/show_bug.cgi?id=1303647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://hg.python.org/cpython/rev/b3ce713fb9be
https://hg.python.org/cpython/rev/d590114c2394
https://linux.oracle.com/cve/CVE-2016-0772.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
python2.7-minimal CVE-2016-1000110 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2016-1000110
https://bugs.python.org/issue27568
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110
https://linux.oracle.com/cve/CVE-2016-1000110.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/
https://security-tracker.debian.org/tracker/CVE-2016-1000110
https://ubuntu.com/security/notices/USN-3134-1
python2.7-minimal CVE-2016-5636 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-2586.html
http://www.openwall.com/lists/oss-security/2016/06/15/15
http://www.openwall.com/lists/oss-security/2016/06/16/1
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91247
http://www.securitytracker.com/id/1038138
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5636
https://bugs.python.org/issue26171
https://bugs.python.org/msg278228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://linux.oracle.com/cve/CVE-2016-5636.html
https://linux.oracle.com/errata/ELSA-2016-2586.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
python2.7-minimal CVE-2016-5699 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.3
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/7
http://www.openwall.com/lists/oss-security/2016/06/15/12
http://www.openwall.com/lists/oss-security/2016/06/16/2
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91226
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5699
https://bugs.python.org/issue22928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4
https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS
https://hg.python.org/cpython/rev/1c45047c5102
https://hg.python.org/cpython/rev/bf3e1c9b80e9
https://linux.oracle.com/cve/CVE-2016-5699.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://ubuntu.com/security/notices/USN-3134-1
python2.7-minimal CVE-2017-1000158 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.4
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.debian.org/security/2018/dsa-4307
python2.7-minimal CVE-2018-1000802 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2018-1000802
https://bugs.python.org/issue34540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802
https://github.com/python/cpython/pull/8985
https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
python2.7-minimal CVE-2018-14647 MEDIUM 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securityfocus.com/bid/105396
http://www.securitytracker.com/id/1041740
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:2030
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-14647
https://bugs.python.org/issue34623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647
https://linux.oracle.com/cve/CVE-2018-14647.html
https://linux.oracle.com/errata/ELSA-2019-2030.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
python2.7-minimal CVE-2018-1000030 LOW 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
python2.7-minimal CVE-2018-1060 LOW 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1060
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1060.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
https://www.oracle.com/security-alerts/cpujan2020.html
python2.7-minimal CVE-2018-1061 LOW 2.7.6-8ubuntu0.2 2.7.6-8ubuntu0.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1061
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1061.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
python3.4 CVE-2016-0772 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/9
http://www.securityfocus.com/bid/91225
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-0772
https://bugzilla.redhat.com/show_bug.cgi?id=1303647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://hg.python.org/cpython/rev/b3ce713fb9be
https://hg.python.org/cpython/rev/d590114c2394
https://linux.oracle.com/cve/CVE-2016-0772.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
python3.4 CVE-2016-1000110 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2016-1000110
https://bugs.python.org/issue27568
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110
https://linux.oracle.com/cve/CVE-2016-1000110.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/
https://security-tracker.debian.org/tracker/CVE-2016-1000110
https://ubuntu.com/security/notices/USN-3134-1
python3.4 CVE-2016-5636 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-2586.html
http://www.openwall.com/lists/oss-security/2016/06/15/15
http://www.openwall.com/lists/oss-security/2016/06/16/1
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91247
http://www.securitytracker.com/id/1038138
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5636
https://bugs.python.org/issue26171
https://bugs.python.org/msg278228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://linux.oracle.com/cve/CVE-2016-5636.html
https://linux.oracle.com/errata/ELSA-2016-2586.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
python3.4 CVE-2016-5699 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/7
http://www.openwall.com/lists/oss-security/2016/06/15/12
http://www.openwall.com/lists/oss-security/2016/06/16/2
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91226
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5699
https://bugs.python.org/issue22928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4
https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS
https://hg.python.org/cpython/rev/1c45047c5102
https://hg.python.org/cpython/rev/bf3e1c9b80e9
https://linux.oracle.com/cve/CVE-2016-5699.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://ubuntu.com/security/notices/USN-3134-1
python3.4 CVE-2017-1000158 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.6
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.debian.org/security/2018/dsa-4307
python3.4 CVE-2018-1000802 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2018-1000802
https://bugs.python.org/issue34540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802
https://github.com/python/cpython/pull/8985
https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
python3.4 CVE-2018-14647 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securityfocus.com/bid/105396
http://www.securitytracker.com/id/1041740
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:2030
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-14647
https://bugs.python.org/issue34623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647
https://linux.oracle.com/cve/CVE-2018-14647.html
https://linux.oracle.com/errata/ELSA-2019-2030.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
python3.4 CVE-2018-1060 LOW 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1060
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1060.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
https://www.oracle.com/security-alerts/cpujan2020.html
python3.4 CVE-2018-1061 LOW 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1061
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1061.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
python3.4-minimal CVE-2016-0772 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/9
http://www.securityfocus.com/bid/91225
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-0772
https://bugzilla.redhat.com/show_bug.cgi?id=1303647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://hg.python.org/cpython/rev/b3ce713fb9be
https://hg.python.org/cpython/rev/d590114c2394
https://linux.oracle.com/cve/CVE-2016-0772.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
python3.4-minimal CVE-2016-1000110 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2016-1000110
https://bugs.python.org/issue27568
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110
https://linux.oracle.com/cve/CVE-2016-1000110.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/
https://security-tracker.debian.org/tracker/CVE-2016-1000110
https://ubuntu.com/security/notices/USN-3134-1
python3.4-minimal CVE-2016-5636 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-2586.html
http://www.openwall.com/lists/oss-security/2016/06/15/15
http://www.openwall.com/lists/oss-security/2016/06/16/1
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91247
http://www.securitytracker.com/id/1038138
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5636
https://bugs.python.org/issue26171
https://bugs.python.org/msg278228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://linux.oracle.com/cve/CVE-2016-5636.html
https://linux.oracle.com/errata/ELSA-2016-2586.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://security.gentoo.org/glsa/201701-18
https://ubuntu.com/security/notices/USN-3134-1
python3.4-minimal CVE-2016-5699 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.5
Expand...http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://rhn.redhat.com/errata/RHSA-2016-1626.html
http://rhn.redhat.com/errata/RHSA-2016-1627.html
http://rhn.redhat.com/errata/RHSA-2016-1628.html
http://rhn.redhat.com/errata/RHSA-2016-1629.html
http://rhn.redhat.com/errata/RHSA-2016-1630.html
http://www.openwall.com/lists/oss-security/2016/06/14/7
http://www.openwall.com/lists/oss-security/2016/06/15/12
http://www.openwall.com/lists/oss-security/2016/06/16/2
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91226
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/security/cve/CVE-2016-5699
https://bugs.python.org/issue22928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4
https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS
https://hg.python.org/cpython/rev/1c45047c5102
https://hg.python.org/cpython/rev/bf3e1c9b80e9
https://linux.oracle.com/cve/CVE-2016-5699.html
https://linux.oracle.com/errata/ELSA-2016-1626.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
https://ubuntu.com/security/notices/USN-3134-1
python3.4-minimal CVE-2017-1000158 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.6
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.debian.org/security/2018/dsa-4307
python3.4-minimal CVE-2018-1000802 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2018-1000802
https://bugs.python.org/issue34540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802
https://github.com/python/cpython/pull/8985
https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
python3.4-minimal CVE-2018-14647 MEDIUM 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securityfocus.com/bid/105396
http://www.securitytracker.com/id/1041740
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:2030
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-14647
https://bugs.python.org/issue34623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647
https://linux.oracle.com/cve/CVE-2018-14647.html
https://linux.oracle.com/errata/ELSA-2019-2030.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
python3.4-minimal CVE-2018-1060 LOW 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1060
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1060.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
https://www.oracle.com/security-alerts/cpujan2020.html
python3.4-minimal CVE-2018-1061 LOW 3.4.3-1ubuntu1~14.04.3 3.4.3-1ubuntu1~14.04.7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3041
https://access.redhat.com/errata/RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/security/cve/CVE-2018-1061
https://bugs.python.org/issue32981
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-final
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
https://linux.oracle.com/cve/CVE-2018-1061.html
https://linux.oracle.com/errata/ELSA-2018-3041.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.debian.org/security/2018/dsa-4306
https://www.debian.org/security/2018/dsa-4307
rsync CVE-2017-17433 MEDIUM 3.1.0-2ubuntu0.2 3.1.0-2ubuntu0.3
Expand...http://security.cucumberlinux.com/security/details.php?id=169
https://access.redhat.com/security/cve/CVE-2017-17433
https://bugzilla.redhat.com/show_bug.cgi?id=1522874#c4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17433
https://git.samba.org/?p=rsync.git;a=commit;h=3e06d40029cfdce9d0f73d87cfd4edaf54be9c51
https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html
https://ubuntu.com/security/notices/USN-3506-1
https://ubuntu.com/security/notices/USN-3506-2
https://www.debian.org/security/2017/dsa-4068
rsync CVE-2017-17434 MEDIUM 3.1.0-2ubuntu0.2 3.1.0-2ubuntu0.3
Expand...http://security.cucumberlinux.com/security/details.php?id=170
https://access.redhat.com/security/cve/CVE-2017-17434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17434
https://git.samba.org/?p=rsync.git;a=commit;h=5509597decdbd7b91994210f700329d8a35e70a1
https://git.samba.org/?p=rsync.git;a=commit;h=70aeb5fddd1b2f8e143276f8d5a085db16c593b9
https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html
https://ubuntu.com/security/notices/USN-3506-1
https://ubuntu.com/security/notices/USN-3506-2
https://www.debian.org/security/2017/dsa-4068
rsync CVE-2018-5764 MEDIUM 3.1.0-2ubuntu0.2 3.1.0-2ubuntu0.4
Expand...http://www.securityfocus.com/bid/102803
http://www.securitytracker.com/id/1040276
https://access.redhat.com/security/cve/CVE-2018-5764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5764
https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS
https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=7706303828fcde524222babb2833864a4bd09e07
https://lists.debian.org/debian-lts-announce/2018/01/msg00021.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00028.html
https://security.gentoo.org/glsa/201805-04
https://ubuntu.com/security/notices/USN-3543-1
https://ubuntu.com/security/notices/USN-3543-2
https://usn.ubuntu.com/3543-1/
rsync CVE-2017-16548 LOW 3.1.0-2ubuntu0.2 3.1.0-2ubuntu0.4
Expand...https://access.redhat.com/security/cve/CVE-2017-16548
https://bugzilla.samba.org/show_bug.cgi?id=13112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548
https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1
https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html
https://ubuntu.com/security/notices/USN-3543-1
https://ubuntu.com/security/notices/USN-3543-2
https://usn.ubuntu.com/3543-1/
https://usn.ubuntu.com/3543-2/
https://www.debian.org/security/2017/dsa-4068
sensible-utils CVE-2017-17512 MEDIUM 0.0.9 0.0.9ubuntu0.14.04.1
Expand...http://metadata.ftp-master.debian.org/changelogs/main/s/sensible-utils/sensible-utils_0.0.11_changelog
https://bugs.debian.org/881767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17512
https://lists.debian.org/debian-lts-announce/2017/12/msg00012.html
https://ubuntu.com/security/notices/USN-3584-1
https://usn.ubuntu.com/3584-1/
https://www.debian.org/security/2017/dsa-4071
sudo CVE-2017-1000367 HIGH 1.8.9p5-1ubuntu1.2 1.8.9p5-1ubuntu1.4
Expand...http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00077.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00079.html
http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html
http://seclists.org/fulldisclosure/2017/Jun/3
http://www.debian.org/security/2017/dsa-3867
http://www.openwall.com/lists/oss-security/2017/05/30/16
http://www.securityfocus.com/bid/98745
http://www.securitytracker.com/id/1038582
http://www.ubuntu.com/usn/USN-3304-1
https://access.redhat.com/errata/RHSA-2017:1381
https://access.redhat.com/errata/RHSA-2017:1382
https://access.redhat.com/security/cve/CVE-2017-1000367
https://access.redhat.com/security/vulnerabilities/3059071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367
https://linux.oracle.com/cve/CVE-2017-1000367.html
https://linux.oracle.com/errata/ELSA-2017-1382.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEXC4NNIG2QOZY6N2YUK246KI3D3UQO/
https://security.gentoo.org/glsa/201705-15
https://ubuntu.com/security/notices/USN-3304-1
https://www.exploit-db.com/exploits/42183/
https://www.sudo.ws/alerts/linux_tty.html
supervisor CVE-2017-11610 MEDIUM 3.0b2-1 3.0b2-1ubuntu0.1
Expand...http://www.debian.org/security/2017/dsa-3942
https://access.redhat.com/errata/RHSA-2017:3005
https://access.redhat.com/security/cve/CVE-2017-11610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11610
https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt
https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt
https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt
https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt
https://github.com/Supervisor/supervisor/issues/964
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/
https://security.gentoo.org/glsa/201709-06
https://www.exploit-db.com/exploits/42779/
tar CVE-2016-6321 MEDIUM 1.27.1-1 1.27.1-1ubuntu0.1
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=7340f67b9860ea0531c1450e5aa261c50f67165d
http://lists.gnu.org/archive/html/bug-tar/2016-10/msg00016.html
http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html
http://seclists.org/fulldisclosure/2016/Oct/102
http://seclists.org/fulldisclosure/2016/Oct/96
http://www.debian.org/security/2016/dsa-3702
http://www.securityfocus.com/bid/93937
http://www.ubuntu.com/usn/USN-3132-1
https://access.redhat.com/security/cve/CVE-2016-6321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201611-19
https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt
https://sintonen.fi/advisories/tar-extract-pathname-bypass.txt
https://ubuntu.com/security/notices/USN-3132-1
udev CVE-2018-1049 MEDIUM 204-5ubuntu20.15 204-5ubuntu20.26
Expand...http://www.securitytracker.com/id/1041520
https://access.redhat.com/errata/RHSA-2018:0260
https://access.redhat.com/security/cve/CVE-2018-1049
https://bugzilla.redhat.com/show_bug.cgi?id=1534701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049
https://github.com/systemd/systemd/pull/5916
https://linux.oracle.com/cve/CVE-2018-1049.html
https://linux.oracle.com/errata/ELSA-2018-0260.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html
https://ubuntu.com/security/notices/USN-3558-1
https://usn.ubuntu.com/3558-1/
udev CVE-2019-3842 MEDIUM 204-5ubuntu20.15 204-5ubuntu20.31
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html
https://access.redhat.com/security/cve/CVE-2019-3842
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842
https://linux.oracle.com/cve/CVE-2019-3842.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
https://nvd.nist.gov/vuln/detail/CVE-2019-3842
https://ubuntu.com/security/notices/USN-3938-1
https://www.exploit-db.com/exploits/46743/
vim-common CVE-2016-1248 MEDIUM 2:7.4.052-1ubuntu3 2:7.4.052-1ubuntu3.1
Expand...http://openwall.com/lists/oss-security/2016/11/22/20
http://rhn.redhat.com/errata/RHSA-2016-2972.html
http://www.debian.org/security/2016/dsa-3722
http://www.securityfocus.com/bid/94478
http://www.securitytracker.com/id/1037338
http://www.ubuntu.com/usn/USN-3139-1
https://access.redhat.com/security/cve/CVE-2016-1248
https://anonscm.debian.org/cgit/pkg-vim/vim.git/tree/debian/changelog
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1248
https://github.com/neovim/neovim/commit/4fad66fbe637818b6b3d6bc5d21923ba72795040
https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a
https://github.com/vim/vim/releases/tag/v8.0.0056
https://linux.oracle.com/cve/CVE-2016-1248.html
https://linux.oracle.com/errata/ELSA-2016-2972.html
https://lists.debian.org/debian-lts-announce/2016/11/msg00025.html
https://lists.debian.org/debian-security-announce/2016/msg00305.html
https://security.gentoo.org/glsa/201701-29
https://ubuntu.com/security/notices/USN-3139-1
vim-tiny CVE-2016-1248 MEDIUM 2:7.4.052-1ubuntu3 2:7.4.052-1ubuntu3.1
Expand...http://openwall.com/lists/oss-security/2016/11/22/20
http://rhn.redhat.com/errata/RHSA-2016-2972.html
http://www.debian.org/security/2016/dsa-3722
http://www.securityfocus.com/bid/94478
http://www.securitytracker.com/id/1037338
http://www.ubuntu.com/usn/USN-3139-1
https://access.redhat.com/security/cve/CVE-2016-1248
https://anonscm.debian.org/cgit/pkg-vim/vim.git/tree/debian/changelog
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1248
https://github.com/neovim/neovim/commit/4fad66fbe637818b6b3d6bc5d21923ba72795040
https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a
https://github.com/vim/vim/releases/tag/v8.0.0056
https://linux.oracle.com/cve/CVE-2016-1248.html
https://linux.oracle.com/errata/ELSA-2016-2972.html
https://lists.debian.org/debian-lts-announce/2016/11/msg00025.html
https://lists.debian.org/debian-security-announce/2016/msg00305.html
https://security.gentoo.org/glsa/201701-29
https://ubuntu.com/security/notices/USN-3139-1