2022-06-21 09:54:34 +00:00
---
hide:
- toc
---
# Security Overview
< link href = "https://truecharts.org/_static/trivy.css" type = "text/css" rel = "stylesheet" / >
## Helm-Chart
##### Scan Results
#### Chart Object: mstream/templates/common.yaml
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | < details > < summary > Expand...< / summary > A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. < br > < hr > < br > Container ' RELEASE-NAME-mstream' of Deployment ' RELEASE-NAME-mstream' should set ' securityContext.allowPrivilegeEscalation' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv001" > https://avd.aquasec.com/misconfig/ksv001< / a > < br > < / details > |
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | < details > < summary > Expand...< / summary > A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-mstream' should set ' securityContext.allowPrivilegeEscalation' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv001" > https://avd.aquasec.com/misconfig/ksv001< / a > < br > < / details > |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' RELEASE-NAME-mstream' of Deployment ' RELEASE-NAME-mstream' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv003" > https://avd.aquasec.com/misconfig/ksv003< / a > < br > < / details > |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-mstream' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv003" > https://avd.aquasec.com/misconfig/ksv003< / a > < br > < / details > |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' RELEASE-NAME-mstream' of Deployment ' RELEASE-NAME-mstream' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv012" > https://avd.aquasec.com/misconfig/ksv012< / a > < br > < / details > |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-mstream' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv012" > https://avd.aquasec.com/misconfig/ksv012< / a > < br > < / details > |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' RELEASE-NAME-mstream' of Deployment ' RELEASE-NAME-mstream' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv014" > https://avd.aquasec.com/misconfig/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-mstream' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv014" > https://avd.aquasec.com/misconfig/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | < details > < summary > Expand...< / summary > Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-mstream' should set ' securityContext.privileged' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv017" > https://avd.aquasec.com/misconfig/ksv017< / a > < br > < / details > |
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-mstream' of Deployment ' RELEASE-NAME-mstream' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv020" > https://avd.aquasec.com/misconfig/ksv020< / a > < br > < / details > |
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-mstream' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv020" > https://avd.aquasec.com/misconfig/ksv020< / a > < br > < / details > |
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-mstream' of Deployment ' RELEASE-NAME-mstream' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv021" > https://avd.aquasec.com/misconfig/ksv021< / a > < br > < / details > |
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-mstream' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv021" > https://avd.aquasec.com/misconfig/ksv021< / a > < br > < / details > |
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | < details > < summary > Expand...< / summary > The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. < br > < hr > < br > Either Pod or Container should set ' securityContext.seccompProfile.type' to ' RuntimeDefault' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv030" > https://avd.aquasec.com/misconfig/ksv030< / a > < br > < / details > |
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | < details > < summary > Expand...< / summary > The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. < br > < hr > < br > Either Pod or Container should set ' securityContext.seccompProfile.type' to ' RuntimeDefault' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv030" > https://avd.aquasec.com/misconfig/ksv030< / a > < br > < / details > |
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | < details > < summary > Expand...< / summary > Containers should be forbidden from running with a root UID. < br > < hr > < br > securityContext.runAsUser should be set to a value greater than 0 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv105" > https://avd.aquasec.com/misconfig/ksv105< / a > < br > < / details > |
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | < details > < summary > Expand...< / summary > Containers should be forbidden from running with a root UID. < br > < hr > < br > securityContext.runAsUser should be set to a value greater than 0 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv105" > https://avd.aquasec.com/misconfig/ksv105< / a > < br > < / details > |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | < details > < summary > Expand...< / summary > Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. < br > < hr > < br > container should drop all < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv106" > https://avd.aquasec.com/misconfig/ksv106< / a > < br > < / details > |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | < details > < summary > Expand...< / summary > Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. < br > < hr > < br > container should drop all < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv106" > https://avd.aquasec.com/misconfig/ksv106< / a > < br > < / details > |
## Containers
##### Detected Containers
tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730
tccr.io/truecharts/mstream:version-v5.2.5@sha256:1ac2f1c3177e09428cf5be1f33c7110863b69a748f691f8385dc96a313d84e7b
##### Scan Results
#### Container: tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730 (alpine 3.16.0)
**alpine**
| No Vulnerabilities found |
|:---------------------------------|
#### Container: tccr.io/truecharts/mstream:version-v5.2.5@sha256:1ac2f1c3177e09428cf5be1f33c7110863b69a748f691f8385dc96a313d84e7b (alpine 3.13)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| busybox | CVE-2022-28391 | CRITICAL | 1.32.1-r6 | 1.32.1-r8 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-28391" > https://access.redhat.com/security/cve/CVE-2022-28391< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch< / a > < br > < a href = "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" > https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-28391" > https://nvd.nist.gov/vuln/detail/CVE-2022-28391< / a > < br > < / details > |
| busybox | CVE-2021-42378 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42378" > https://access.redhat.com/security/cve/CVE-2021-42378< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42378" > https://nvd.nist.gov/vuln/detail/CVE-2021-42378< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42379 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42379" > https://access.redhat.com/security/cve/CVE-2021-42379< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42379" > https://nvd.nist.gov/vuln/detail/CVE-2021-42379< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42380 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42380" > https://access.redhat.com/security/cve/CVE-2021-42380< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42380" > https://nvd.nist.gov/vuln/detail/CVE-2021-42380< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42381 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42381" > https://access.redhat.com/security/cve/CVE-2021-42381< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42381" > https://nvd.nist.gov/vuln/detail/CVE-2021-42381< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42382 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42382" > https://access.redhat.com/security/cve/CVE-2021-42382< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42382" > https://nvd.nist.gov/vuln/detail/CVE-2021-42382< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42383 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42383" > https://access.redhat.com/security/cve/CVE-2021-42383< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < / details > |
| busybox | CVE-2021-42384 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42384" > https://access.redhat.com/security/cve/CVE-2021-42384< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42384" > https://nvd.nist.gov/vuln/detail/CVE-2021-42384< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42385 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42385" > https://access.redhat.com/security/cve/CVE-2021-42385< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42385" > https://nvd.nist.gov/vuln/detail/CVE-2021-42385< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42386 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42386" > https://access.redhat.com/security/cve/CVE-2021-42386< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42386" > https://nvd.nist.gov/vuln/detail/CVE-2021-42386< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42374 | MEDIUM | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42374" > https://access.redhat.com/security/cve/CVE-2021-42374< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42374" > https://nvd.nist.gov/vuln/detail/CVE-2021-42374< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| busybox | CVE-2021-42375 | MEDIUM | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42375" > https://access.redhat.com/security/cve/CVE-2021-42375< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < / details > |
| libcrypto1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/08/26/2" > http://www.openwall.com/lists/oss-security/2021/08/26/2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3711" > https://access.redhat.com/security/cve/CVE-2021-3711< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46< / a > < br > < a href = "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3711" > https://nvd.nist.gov/vuln/detail/CVE-2021-3711< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2021-0097.html" > https://rustsec.org/advisories/RUSTSEC-2021-0097.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0010/" > https://security.netapp.com/advisory/ntap-20210827-0010/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-1" > https://ubuntu.com/security/notices/USN-5051-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4963" > https://www.debian.org/security/2021/dsa-4963< / a > < br > < a href = "https://www.openssl.org/news/secadv/20210824.txt" > https://www.openssl.org/news/secadv/20210824.txt< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < a href = "https://www.tenable.com/security/tns-2021-16" > https://www.tenable.com/security/tns-2021-16< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-02" > https://www.tenable.com/security/tns-2022-02< / a > < br > < / details > |
| libcrypto1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/08/26/2" > http://www.openwall.com/lists/oss-security/2021/08/26/2< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3712" > https://access.redhat.com/security/cve/CVE-2021-3712< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" > https://kc.mcafee.com/corporate/index?page=content& id=SB10366< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3712.html" > https://linux.oracle.com/cve/CVE-2021-3712.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9023.html" > https://linux.oracle.com/errata/ELSA-2022-9023.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" > https://nvd.nist.gov/vuln/detail/CVE-2021-3712< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2021-0098.html" > https://rustsec.org/advisories/RUSTSEC-2021-0098.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0010/" > https://security.netapp.com/advisory/ntap-20210827-0010/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-1" > https://ubuntu.com/security/notices/USN-5051-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-2" > https://ubuntu.com/security/notices/USN-5051-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-3" > https://ubuntu.com/security/notices/USN-5051-3< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)" > https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5088-1" > https://ubuntu.com/security/notices/USN-5088-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4963" > https://www.debian.org/security/2021/dsa-4963< / a > < br > < a href = "https://www.openssl.org/news/secadv/20210824.txt" > https://www.openssl.org/news/secadv/20210824.txt< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan20
| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1k-r0 | 1.1.1n-r0 | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" > http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/33" > http://seclists.org/fulldisclosure/2022/May/33< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/38" > http://seclists.org/fulldisclosure/2022/May/38< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0778" > https://access.redhat.com/security/cve/CVE-2022-0778< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2022-1065.html" > https://errata.almalinux.org/8/ALSA-2022-1065.html< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0778.html" > https://linux.oracle.com/cve/CVE-2022-0778.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9272.html" > https://linux.oracle.com/errata/ELSA-2022-9272.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" > https://nvd.nist.gov/vuln/detail/CVE-2022-0778< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" > https://rustsec.org/advisories/RUSTSEC-2022-0014.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220321-0002/" > https://security.netapp.com/advisory/ntap-20220321-0002/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220429-0005/" > https://security.netapp.com/advisory/ntap-202204
| libssl1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/08/26/2" > http://www.openwall.com/lists/oss-security/2021/08/26/2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3711" > https://access.redhat.com/security/cve/CVE-2021-3711< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46< / a > < br > < a href = "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3711" > https://nvd.nist.gov/vuln/detail/CVE-2021-3711< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2021-0097.html" > https://rustsec.org/advisories/RUSTSEC-2021-0097.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0010/" > https://security.netapp.com/advisory/ntap-20210827-0010/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-1" > https://ubuntu.com/security/notices/USN-5051-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4963" > https://www.debian.org/security/2021/dsa-4963< / a > < br > < a href = "https://www.openssl.org/news/secadv/20210824.txt" > https://www.openssl.org/news/secadv/20210824.txt< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < a href = "https://www.tenable.com/security/tns-2021-16" > https://www.tenable.com/security/tns-2021-16< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-02" > https://www.tenable.com/security/tns-2022-02< / a > < br > < / details > |
| libssl1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/08/26/2" > http://www.openwall.com/lists/oss-security/2021/08/26/2< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3712" > https://access.redhat.com/security/cve/CVE-2021-3712< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" > https://kc.mcafee.com/corporate/index?page=content& id=SB10366< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3712.html" > https://linux.oracle.com/cve/CVE-2021-3712.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9023.html" > https://linux.oracle.com/errata/ELSA-2022-9023.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" > https://nvd.nist.gov/vuln/detail/CVE-2021-3712< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2021-0098.html" > https://rustsec.org/advisories/RUSTSEC-2021-0098.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0010/" > https://security.netapp.com/advisory/ntap-20210827-0010/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-1" > https://ubuntu.com/security/notices/USN-5051-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-2" > https://ubuntu.com/security/notices/USN-5051-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-3" > https://ubuntu.com/security/notices/USN-5051-3< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)" > https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5088-1" > https://ubuntu.com/security/notices/USN-5088-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4963" > https://www.debian.org/security/2021/dsa-4963< / a > < br > < a href = "https://www.openssl.org/news/secadv/20210824.txt" > https://www.openssl.org/news/secadv/20210824.txt< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.
| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1k-r0 | 1.1.1n-r0 | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" > http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/33" > http://seclists.org/fulldisclosure/2022/May/33< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/38" > http://seclists.org/fulldisclosure/2022/May/38< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0778" > https://access.redhat.com/security/cve/CVE-2022-0778< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2022-1065.html" > https://errata.almalinux.org/8/ALSA-2022-1065.html< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0778.html" > https://linux.oracle.com/cve/CVE-2022-0778.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9272.html" > https://linux.oracle.com/errata/ELSA-2022-9272.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" > https://nvd.nist.gov/vuln/detail/CVE-2022-0778< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" > https://rustsec.org/advisories/RUSTSEC-2022-0014.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220321-0002/" > https://security.netapp.com/advisory/ntap-20220321-0002/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220429-0005/" > https://security.netapp.com/advisory/ntap-20220429-
| nodejs | CVE-2021-22931 | CRITICAL | 14.17.4-r0 | 14.17.5-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22931" > https://access.redhat.com/security/cve/CVE-2021-22931< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3666.html" > https://errata.almalinux.org/8/ALSA-2021-3666.html< / a > < br > < a href = "https://hackerone.com/reports/1178337" > https://hackerone.com/reports/1178337< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22931.html" > https://linux.oracle.com/cve/CVE-2021-22931.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3666.html" > https://linux.oracle.com/errata/ELSA-2021-3666.html< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" > https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" > https://nvd.nist.gov/vuln/detail/CVE-2021-22931< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0001/" > https://security.netapp.com/advisory/ntap-20210923-0001/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| nodejs | CVE-2021-37701 | HIGH | 14.17.4-r0 | 14.17.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37701" > https://access.redhat.com/security/cve/CVE-2021-37701< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-9r2w-394v-53qc" > https://github.com/advisories/GHSA-9r2w-394v-53qc< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc" > https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37701.html" > https://linux.oracle.com/cve/CVE-2021-37701.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37701" > https://nvd.nist.gov/vuln/detail/CVE-2021-37701< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5008" > https://www.debian.org/security/2021/dsa-5008< / a > < br > < a href = "https://www.npmjs.com/advisories/1779" > https://www.npmjs.com/advisories/1779< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| nodejs | CVE-2021-37712 | HIGH | 14.17.4-r0 | 14.17.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37712" > https://access.redhat.com/security/cve/CVE-2021-37712< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-qq89-hq3f-393p" > https://github.com/advisories/GHSA-qq89-hq3f-393p< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p" > https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37712.html" > https://linux.oracle.com/cve/CVE-2021-37712.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37712" > https://nvd.nist.gov/vuln/detail/CVE-2021-37712< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5008" > https://www.debian.org/security/2021/dsa-5008< / a > < br > < a href = "https://www.npmjs.com/advisories/1780" > https://www.npmjs.com/advisories/1780< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| nodejs | CVE-2021-37713 | HIGH | 14.17.4-r0 | 14.17.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37713" > https://access.redhat.com/security/cve/CVE-2021-37713< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-5955-9wpr-37jh" > https://github.com/advisories/GHSA-5955-9wpr-37jh< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh" > https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37713" > https://nvd.nist.gov/vuln/detail/CVE-2021-37713< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| nodejs | CVE-2021-39134 | HIGH | 14.17.4-r0 | 14.17.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-39134" > https://access.redhat.com/security/cve/CVE-2021-39134< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-2h3h-q99f-3fhc" > https://github.com/advisories/GHSA-2h3h-q99f-3fhc< / a > < br > < a href = "https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc" > https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39134" > https://nvd.nist.gov/vuln/detail/CVE-2021-39134< / a > < br > < a href = "https://www.npmjs.com/package/@npmcli/arborist" > https://www.npmjs.com/package/@npmcli/arborist< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| nodejs | CVE-2021-39135 | HIGH | 14.17.4-r0 | 14.17.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-39135" > https://access.redhat.com/security/cve/CVE-2021-39135< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-gmw6-94gg-2rc2" > https://github.com/advisories/GHSA-gmw6-94gg-2rc2< / a > < br > < a href = "https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2" > https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39135" > https://nvd.nist.gov/vuln/detail/CVE-2021-39135< / a > < br > < a href = "https://www.npmjs.com/package/@npmcli/arborist" > https://www.npmjs.com/package/@npmcli/arborist< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| nodejs | CVE-2021-44531 | HIGH | 14.17.4-r0 | 14.19.0-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44531" > https://access.redhat.com/security/cve/CVE-2021-44531< / a > < br > < a href = "https://hackerone.com/reports/1429694" > https://hackerone.com/reports/1429694< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" > https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-44531" > https://nvd.nist.gov/vuln/detail/CVE-2021-44531< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220325-0007/" > https://security.netapp.com/advisory/ntap-20220325-0007/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| nodejs | CVE-2022-21824 | HIGH | 14.17.4-r0 | 14.19.0-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-21824" > https://access.redhat.com/security/cve/CVE-2022-21824< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824< / a > < br > < a href = "https://github.com/nodejs/node/commit/be69403528da99bf3df9e1dc47186f18ba59cb5e (v12.x)" > https://github.com/nodejs/node/commit/be69403528da99bf3df9e1dc47186f18ba59cb5e (v12.x)< / a > < br > < a href = "https://hackerone.com/reports/1431042" > https://hackerone.com/reports/1431042< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" > https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#prototype-pollution-via-console-table-properties-low-cve-2022-21824" > https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#prototype-pollution-via-console-table-properties-low-cve-2022-21824< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-21824" > https://nvd.nist.gov/vuln/detail/CVE-2022-21824< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220325-0007/" > https://security.netapp.com/advisory/ntap-20220325-0007/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| nodejs | CVE-2021-22939 | MEDIUM | 14.17.4-r0 | 14.17.5-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22939" > https://access.redhat.com/security/cve/CVE-2021-22939< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3666.html" > https://errata.almalinux.org/8/ALSA-2021-3666.html< / a > < br > < a href = "https://hackerone.com/reports/1278254" > https://hackerone.com/reports/1278254< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22939.html" > https://linux.oracle.com/cve/CVE-2021-22939.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3666.html" > https://linux.oracle.com/errata/ELSA-2021-3666.html< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" > https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" > https://nvd.nist.gov/vuln/detail/CVE-2021-22939< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210917-0003/" > https://security.netapp.com/advisory/ntap-20210917-0003/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| nodejs | CVE-2021-22959 | MEDIUM | 14.17.4-r0 | 14.18.1-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22959" > https://access.redhat.com/security/cve/CVE-2021-22959< / a > < br > < a href = "https://hackerone.com/reports/1238709" > https://hackerone.com/reports/1238709< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22959.html" > https://linux.oracle.com/cve/CVE-2021-22959.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/" > https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
| nodejs | CVE-2021-22960 | MEDIUM | 14.17.4-r0 | 14.18.1-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22960" > https://access.redhat.com/security/cve/CVE-2021-22960< / a > < br > < a href = "https://hackerone.com/reports/1238099" > https://hackerone.com/reports/1238099< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22960.html" > https://linux.oracle.com/cve/CVE-2021-22960.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/" > https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
| nodejs | CVE-2021-3672 | MEDIUM | 14.17.4-r0 | 14.17.5-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3672" > https://access.redhat.com/security/cve/CVE-2021-3672< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" > https://bugzilla.redhat.com/show_bug.cgi?id=1988342< / a > < br > < a href = "https://c-ares.haxx.se/adv_20210810.html" > https://c-ares.haxx.se/adv_20210810.html< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2022-2043.html" > https://errata.almalinux.org/8/ALSA-2022-2043.html< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3672.html" > https://linux.oracle.com/cve/CVE-2021-3672.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-2043.html" > https://linux.oracle.com/errata/ELSA-2022-2043.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" > https://nvd.nist.gov/vuln/detail/CVE-2021-3672< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5034-1" > https://ubuntu.com/security/notices/USN-5034-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5034-2" > https://ubuntu.com/security/notices/USN-5034-2< / a > < br > < / details > |
| nodejs | CVE-2021-44532 | MEDIUM | 14.17.4-r0 | 14.19.0-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44532" > https://access.redhat.com/security/cve/CVE-2021-44532< / a > < br > < a href = "https://hackerone.com/reports/1429694" > https://hackerone.com/reports/1429694< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" > https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-44532" > https://nvd.nist.gov/vuln/detail/CVE-2021-44532< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220325-0007/" > https://security.netapp.com/advisory/ntap-20220325-0007/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| nodejs | CVE-2021-44533 | MEDIUM | 14.17.4-r0 | 14.19.0-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44533" > https://access.redhat.com/security/cve/CVE-2021-44533< / a > < br > < a href = "https://hackerone.com/reports/1429694" > https://hackerone.com/reports/1429694< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" > https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-44533" > https://nvd.nist.gov/vuln/detail/CVE-2021-44533< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220325-0007/" > https://security.netapp.com/advisory/ntap-20220325-0007/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| npm | CVE-2021-22931 | CRITICAL | 14.17.4-r0 | 14.17.5-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22931" > https://access.redhat.com/security/cve/CVE-2021-22931< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3666.html" > https://errata.almalinux.org/8/ALSA-2021-3666.html< / a > < br > < a href = "https://hackerone.com/reports/1178337" > https://hackerone.com/reports/1178337< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22931.html" > https://linux.oracle.com/cve/CVE-2021-22931.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3666.html" > https://linux.oracle.com/errata/ELSA-2021-3666.html< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" > https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" > https://nvd.nist.gov/vuln/detail/CVE-2021-22931< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0001/" > https://security.netapp.com/advisory/ntap-20210923-0001/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| npm | CVE-2021-37701 | HIGH | 14.17.4-r0 | 14.17.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37701" > https://access.redhat.com/security/cve/CVE-2021-37701< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-9r2w-394v-53qc" > https://github.com/advisories/GHSA-9r2w-394v-53qc< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc" > https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37701.html" > https://linux.oracle.com/cve/CVE-2021-37701.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37701" > https://nvd.nist.gov/vuln/detail/CVE-2021-37701< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5008" > https://www.debian.org/security/2021/dsa-5008< / a > < br > < a href = "https://www.npmjs.com/advisories/1779" > https://www.npmjs.com/advisories/1779< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| npm | CVE-2021-37712 | HIGH | 14.17.4-r0 | 14.17.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37712" > https://access.redhat.com/security/cve/CVE-2021-37712< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-qq89-hq3f-393p" > https://github.com/advisories/GHSA-qq89-hq3f-393p< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p" > https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37712.html" > https://linux.oracle.com/cve/CVE-2021-37712.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37712" > https://nvd.nist.gov/vuln/detail/CVE-2021-37712< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5008" > https://www.debian.org/security/2021/dsa-5008< / a > < br > < a href = "https://www.npmjs.com/advisories/1780" > https://www.npmjs.com/advisories/1780< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| npm | CVE-2021-37713 | HIGH | 14.17.4-r0 | 14.17.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37713" > https://access.redhat.com/security/cve/CVE-2021-37713< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-5955-9wpr-37jh" > https://github.com/advisories/GHSA-5955-9wpr-37jh< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh" > https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37713" > https://nvd.nist.gov/vuln/detail/CVE-2021-37713< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| npm | CVE-2021-39134 | HIGH | 14.17.4-r0 | 14.17.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-39134" > https://access.redhat.com/security/cve/CVE-2021-39134< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-2h3h-q99f-3fhc" > https://github.com/advisories/GHSA-2h3h-q99f-3fhc< / a > < br > < a href = "https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc" > https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39134" > https://nvd.nist.gov/vuln/detail/CVE-2021-39134< / a > < br > < a href = "https://www.npmjs.com/package/@npmcli/arborist" > https://www.npmjs.com/package/@npmcli/arborist< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| npm | CVE-2021-39135 | HIGH | 14.17.4-r0 | 14.17.6-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-39135" > https://access.redhat.com/security/cve/CVE-2021-39135< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-gmw6-94gg-2rc2" > https://github.com/advisories/GHSA-gmw6-94gg-2rc2< / a > < br > < a href = "https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2" > https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39135" > https://nvd.nist.gov/vuln/detail/CVE-2021-39135< / a > < br > < a href = "https://www.npmjs.com/package/@npmcli/arborist" > https://www.npmjs.com/package/@npmcli/arborist< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| npm | CVE-2021-44531 | HIGH | 14.17.4-r0 | 14.19.0-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44531" > https://access.redhat.com/security/cve/CVE-2021-44531< / a > < br > < a href = "https://hackerone.com/reports/1429694" > https://hackerone.com/reports/1429694< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" > https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-44531" > https://nvd.nist.gov/vuln/detail/CVE-2021-44531< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220325-0007/" > https://security.netapp.com/advisory/ntap-20220325-0007/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| npm | CVE-2022-21824 | HIGH | 14.17.4-r0 | 14.19.0-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-21824" > https://access.redhat.com/security/cve/CVE-2022-21824< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824< / a > < br > < a href = "https://github.com/nodejs/node/commit/be69403528da99bf3df9e1dc47186f18ba59cb5e (v12.x)" > https://github.com/nodejs/node/commit/be69403528da99bf3df9e1dc47186f18ba59cb5e (v12.x)< / a > < br > < a href = "https://hackerone.com/reports/1431042" > https://hackerone.com/reports/1431042< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" > https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#prototype-pollution-via-console-table-properties-low-cve-2022-21824" > https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#prototype-pollution-via-console-table-properties-low-cve-2022-21824< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-21824" > https://nvd.nist.gov/vuln/detail/CVE-2022-21824< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220325-0007/" > https://security.netapp.com/advisory/ntap-20220325-0007/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| npm | CVE-2021-22939 | MEDIUM | 14.17.4-r0 | 14.17.5-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22939" > https://access.redhat.com/security/cve/CVE-2021-22939< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3666.html" > https://errata.almalinux.org/8/ALSA-2021-3666.html< / a > < br > < a href = "https://hackerone.com/reports/1278254" > https://hackerone.com/reports/1278254< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22939.html" > https://linux.oracle.com/cve/CVE-2021-22939.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3666.html" > https://linux.oracle.com/errata/ELSA-2021-3666.html< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" > https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" > https://nvd.nist.gov/vuln/detail/CVE-2021-22939< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210917-0003/" > https://security.netapp.com/advisory/ntap-20210917-0003/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| npm | CVE-2021-22959 | MEDIUM | 14.17.4-r0 | 14.18.1-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22959" > https://access.redhat.com/security/cve/CVE-2021-22959< / a > < br > < a href = "https://hackerone.com/reports/1238709" > https://hackerone.com/reports/1238709< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22959.html" > https://linux.oracle.com/cve/CVE-2021-22959.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/" > https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
| npm | CVE-2021-22960 | MEDIUM | 14.17.4-r0 | 14.18.1-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22960" > https://access.redhat.com/security/cve/CVE-2021-22960< / a > < br > < a href = "https://hackerone.com/reports/1238099" > https://hackerone.com/reports/1238099< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22960.html" > https://linux.oracle.com/cve/CVE-2021-22960.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/" > https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
| npm | CVE-2021-3672 | MEDIUM | 14.17.4-r0 | 14.17.5-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3672" > https://access.redhat.com/security/cve/CVE-2021-3672< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" > https://bugzilla.redhat.com/show_bug.cgi?id=1988342< / a > < br > < a href = "https://c-ares.haxx.se/adv_20210810.html" > https://c-ares.haxx.se/adv_20210810.html< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2022-2043.html" > https://errata.almalinux.org/8/ALSA-2022-2043.html< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3672.html" > https://linux.oracle.com/cve/CVE-2021-3672.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-2043.html" > https://linux.oracle.com/errata/ELSA-2022-2043.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" > https://nvd.nist.gov/vuln/detail/CVE-2021-3672< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5034-1" > https://ubuntu.com/security/notices/USN-5034-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5034-2" > https://ubuntu.com/security/notices/USN-5034-2< / a > < br > < / details > |
| npm | CVE-2021-44532 | MEDIUM | 14.17.4-r0 | 14.19.0-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44532" > https://access.redhat.com/security/cve/CVE-2021-44532< / a > < br > < a href = "https://hackerone.com/reports/1429694" > https://hackerone.com/reports/1429694< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" > https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-44532" > https://nvd.nist.gov/vuln/detail/CVE-2021-44532< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220325-0007/" > https://security.netapp.com/advisory/ntap-20220325-0007/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| npm | CVE-2021-44533 | MEDIUM | 14.17.4-r0 | 14.19.0-r0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44533" > https://access.redhat.com/security/cve/CVE-2021-44533< / a > < br > < a href = "https://hackerone.com/reports/1429694" > https://hackerone.com/reports/1429694< / a > < br > < a href = "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" > https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-44533" > https://nvd.nist.gov/vuln/detail/CVE-2021-44533< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220325-0007/" > https://security.netapp.com/advisory/ntap-20220325-0007/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| openssl | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/08/26/2" > http://www.openwall.com/lists/oss-security/2021/08/26/2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3711" > https://access.redhat.com/security/cve/CVE-2021-3711< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46< / a > < br > < a href = "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3711" > https://nvd.nist.gov/vuln/detail/CVE-2021-3711< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2021-0097.html" > https://rustsec.org/advisories/RUSTSEC-2021-0097.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0010/" > https://security.netapp.com/advisory/ntap-20210827-0010/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-1" > https://ubuntu.com/security/notices/USN-5051-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4963" > https://www.debian.org/security/2021/dsa-4963< / a > < br > < a href = "https://www.openssl.org/news/secadv/20210824.txt" > https://www.openssl.org/news/secadv/20210824.txt< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < a href = "https://www.tenable.com/security/tns-2021-16" > https://www.tenable.com/security/tns-2021-16< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-02" > https://www.tenable.com/security/tns-2022-02< / a > < br > < / details > |
| openssl | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/08/26/2" > http://www.openwall.com/lists/oss-security/2021/08/26/2< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3712" > https://access.redhat.com/security/cve/CVE-2021-3712< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" > https://kc.mcafee.com/corporate/index?page=content& id=SB10366< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3712.html" > https://linux.oracle.com/cve/CVE-2021-3712.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9023.html" > https://linux.oracle.com/errata/ELSA-2022-9023.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" > https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" > https://nvd.nist.gov/vuln/detail/CVE-2021-3712< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2021-0098.html" > https://rustsec.org/advisories/RUSTSEC-2021-0098.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0010/" > https://security.netapp.com/advisory/ntap-20210827-0010/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-1" > https://ubuntu.com/security/notices/USN-5051-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-2" > https://ubuntu.com/security/notices/USN-5051-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-3" > https://ubuntu.com/security/notices/USN-5051-3< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)" > https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5088-1" > https://ubuntu.com/security/notices/USN-5088-1< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4963" > https://www.debian.org/security/2021/dsa-4963< / a > < br > < a href = "https://www.openssl.org/news/secadv/20210824.txt" > https://www.openssl.org/news/secadv/20210824.txt< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.ht
| openssl | CVE-2022-0778 | HIGH | 1.1.1k-r0 | 1.1.1n-r0 | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" > http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/33" > http://seclists.org/fulldisclosure/2022/May/33< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/38" > http://seclists.org/fulldisclosure/2022/May/38< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0778" > https://access.redhat.com/security/cve/CVE-2022-0778< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf< / a > < br > < a href = "https://crates.io/crates/openssl-src" > https://crates.io/crates/openssl-src< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2022-1065.html" > https://errata.almalinux.org/8/ALSA-2022-1065.html< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0778.html" > https://linux.oracle.com/cve/CVE-2022-0778.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9272.html" > https://linux.oracle.com/errata/ELSA-2022-9272.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" > https://nvd.nist.gov/vuln/detail/CVE-2022-0778< / a > < br > < a href = "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" > https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002< / a > < br > < a href = "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" > https://rustsec.org/advisories/RUSTSEC-2022-0014.html< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220321-0002/" > https://security.netapp.com/advisory/ntap-20220321-0002/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220429-0005/" > https://security.netapp.com/advisory/ntap-20220429-00
| ssl_client | CVE-2022-28391 | CRITICAL | 1.32.1-r6 | 1.32.1-r8 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-28391" > https://access.redhat.com/security/cve/CVE-2022-28391< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch< / a > < br > < a href = "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" > https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-28391" > https://nvd.nist.gov/vuln/detail/CVE-2022-28391< / a > < br > < / details > |
| ssl_client | CVE-2021-42378 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42378" > https://access.redhat.com/security/cve/CVE-2021-42378< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42378" > https://nvd.nist.gov/vuln/detail/CVE-2021-42378< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42379 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42379" > https://access.redhat.com/security/cve/CVE-2021-42379< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42379" > https://nvd.nist.gov/vuln/detail/CVE-2021-42379< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42380 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42380" > https://access.redhat.com/security/cve/CVE-2021-42380< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42380" > https://nvd.nist.gov/vuln/detail/CVE-2021-42380< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42381 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42381" > https://access.redhat.com/security/cve/CVE-2021-42381< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42381" > https://nvd.nist.gov/vuln/detail/CVE-2021-42381< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42382 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42382" > https://access.redhat.com/security/cve/CVE-2021-42382< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42382" > https://nvd.nist.gov/vuln/detail/CVE-2021-42382< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42383 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42383" > https://access.redhat.com/security/cve/CVE-2021-42383< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < / details > |
| ssl_client | CVE-2021-42384 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42384" > https://access.redhat.com/security/cve/CVE-2021-42384< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42384" > https://nvd.nist.gov/vuln/detail/CVE-2021-42384< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42385 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42385" > https://access.redhat.com/security/cve/CVE-2021-42385< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42385" > https://nvd.nist.gov/vuln/detail/CVE-2021-42385< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42386 | HIGH | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42386" > https://access.redhat.com/security/cve/CVE-2021-42386< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42386" > https://nvd.nist.gov/vuln/detail/CVE-2021-42386< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42374 | MEDIUM | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42374" > https://access.redhat.com/security/cve/CVE-2021-42374< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-42374" > https://nvd.nist.gov/vuln/detail/CVE-2021-42374< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5179-1" > https://ubuntu.com/security/notices/USN-5179-1< / a > < br > < / details > |
| ssl_client | CVE-2021-42375 | MEDIUM | 1.32.1-r6 | 1.32.1-r7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-42375" > https://access.redhat.com/security/cve/CVE-2021-42375< / a > < br > < a href = "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" > https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211223-0002/" > https://security.netapp.com/advisory/ntap-20211223-0002/< / a > < br > < / details > |
| xz | CVE-2022-1271 | HIGH | 5.2.5-r0 | 5.2.5-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1271" > https://access.redhat.com/security/cve/CVE-2022-1271< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2022-1537.html" > https://errata.almalinux.org/8/ALSA-2022-1537.html< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1271.html" > https://linux.oracle.com/cve/CVE-2022-1271.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5052.html" > https://linux.oracle.com/errata/ELSA-2022-5052.html< / a > < br > < a href = "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html" > https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-1" > https://ubuntu.com/security/notices/USN-5378-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-2" > https://ubuntu.com/security/notices/USN-5378-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-3" > https://ubuntu.com/security/notices/USN-5378-3< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-4" > https://ubuntu.com/security/notices/USN-5378-4< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/04/07/8" > https://www.openwall.com/lists/oss-security/2022/04/07/8< / a > < br > < / details > |
| xz-libs | CVE-2022-1271 | HIGH | 5.2.5-r0 | 5.2.5-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1271" > https://access.redhat.com/security/cve/CVE-2022-1271< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2022-1537.html" > https://errata.almalinux.org/8/ALSA-2022-1537.html< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1271.html" > https://linux.oracle.com/cve/CVE-2022-1271.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5052.html" > https://linux.oracle.com/errata/ELSA-2022-5052.html< / a > < br > < a href = "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html" > https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-1" > https://ubuntu.com/security/notices/USN-5378-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-2" > https://ubuntu.com/security/notices/USN-5378-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-3" > https://ubuntu.com/security/notices/USN-5378-3< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5378-4" > https://ubuntu.com/security/notices/USN-5378-4< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/04/07/8" > https://www.openwall.com/lists/oss-security/2022/04/07/8< / a > < br > < / details > |
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/May/33" > http://seclists.org/fulldisclosure/2022/May/33< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/38" > http://seclists.org/fulldisclosure/2022/May/38< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/03/25/2" > http://www.openwall.com/lists/oss-security/2022/03/25/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/03/26/1" > http://www.openwall.com/lists/oss-security/2022/03/26/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-25032" > https://access.redhat.com/security/cve/CVE-2018-25032< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2022-2201.html" > https://errata.almalinux.org/8/ALSA-2022-2201.html< / a > < br > < a href = "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" > https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531< / a > < br > < a href = "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" > https://github.com/madler/zlib/compare/v1.2.11...v1.2.12< / a > < br > < a href = "https://github.com/madler/zlib/issues/605" > https://github.com/madler/zlib/issues/605< / a > < br > < a href = "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4" > https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4< / a > < br > < a href = "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5" > https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5< / a > < br > < a href = "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ" > https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2018-25032.html" > https://linux.oracle.com/cve/CVE-2018-25032.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-2213.html" > https://linux.oracle.com/errata/ELSA-2022-2213.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" > https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-25032" > https://nvd.nist.gov/vuln/detail/CVE-2018-25032< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220526-0009/" > https://security.netapp.com/advisory/ntap-20220526-0009/< / a > < br > < a href = "https://support.apple.com/kb/HT213255" > https://support.apple.com/kb/HT213255< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://support.apple.com/kb/HT213257" > https://support.apple.com/kb/HT213257< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-1" > https://ubuntu.com/security/notices/USN-5355-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-2" > https://ubuntu.com/security/notices/USN-5355-2< / a > < br > < a
**node-pkg**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| ansi-regex | CVE-2021-3807 | HIGH | 4.1.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3807" > https://access.redhat.com/security/cve/CVE-2021-3807< / a > < br > < a href = "https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908" > https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908< / a > < br > < a href = "https://github.com/advisories/GHSA-93q8-gq69-wqmw" > https://github.com/advisories/GHSA-93q8-gq69-wqmw< / a > < br > < a href = "https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9" > https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774< / a > < br > < a href = "https://github.com/chalk/ansi-regex/releases/tag/v6.0.1" > https://github.com/chalk/ansi-regex/releases/tag/v6.0.1< / a > < br > < a href = "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994" > https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3807.html" > https://linux.oracle.com/cve/CVE-2021-3807.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3807" > https://nvd.nist.gov/vuln/detail/CVE-2021-3807< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| ansi-regex | CVE-2021-3807 | HIGH | 5.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3807" > https://access.redhat.com/security/cve/CVE-2021-3807< / a > < br > < a href = "https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908" > https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908< / a > < br > < a href = "https://github.com/advisories/GHSA-93q8-gq69-wqmw" > https://github.com/advisories/GHSA-93q8-gq69-wqmw< / a > < br > < a href = "https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9" > https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774< / a > < br > < a href = "https://github.com/chalk/ansi-regex/releases/tag/v6.0.1" > https://github.com/chalk/ansi-regex/releases/tag/v6.0.1< / a > < br > < a href = "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994" > https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3807.html" > https://linux.oracle.com/cve/CVE-2021-3807.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3807" > https://nvd.nist.gov/vuln/detail/CVE-2021-3807< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| async | CVE-2021-43138 | HIGH | 3.2.1 | 2.6.4, 3.2.2 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-fwr7-v2mv-hh25" > https://github.com/advisories/GHSA-fwr7-v2mv-hh25< / a > < br > < a href = "https://github.com/caolan/async/blob/master/lib/internal/iterator.js" > https://github.com/caolan/async/blob/master/lib/internal/iterator.js< / a > < br > < a href = "https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js" > https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js< / a > < br > < a href = "https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264" > https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264< / a > < br > < a href = "https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2" > https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2< / a > < br > < a href = "https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d" > https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d< / a > < br > < a href = "https://github.com/caolan/async/compare/v2.6.3...v2.6.4" > https://github.com/caolan/async/compare/v2.6.3...v2.6.4< / a > < br > < a href = "https://github.com/caolan/async/pull/1828" > https://github.com/caolan/async/pull/1828< / a > < br > < a href = "https://jsfiddle.net/oz5twjd9/" > https://jsfiddle.net/oz5twjd9/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-43138" > https://nvd.nist.gov/vuln/detail/CVE-2021-43138< / a > < br > < / details > |
| axios | CVE-2021-3749 | HIGH | 0.21.1 | 0.21.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3749" > https://access.redhat.com/security/cve/CVE-2021-3749< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3749" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3749< / a > < br > < a href = "https://github.com/advisories/GHSA-cph5-m8f7-6c5x" > https://github.com/advisories/GHSA-cph5-m8f7-6c5x< / a > < br > < a href = "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929" > https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929< / a > < br > < a href = "https://github.com/axios/axios/pull/3980" > https://github.com/axios/axios/pull/3980< / a > < br > < a href = "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31" > https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31< / a > < br > < a href = "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31/" > https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31/< / a > < br > < a href = "https://lists.apache.org/thread.html/r075d464dce95cd13c03ff9384658edcccd5ab2983b82bfc72b62bb10@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r075d464dce95cd13c03ff9384658edcccd5ab2983b82bfc72b62bb10@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4bf1b32983f50be00f9752214c1b53738b621be1c2b0dbd68c7f2391@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r4bf1b32983f50be00f9752214c1b53738b621be1c2b0dbd68c7f2391@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7324ecc35b8027a51cb6ed629490fcd3b2d7cf01c424746ed5744bf1@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r7324ecc35b8027a51cb6ed629490fcd3b2d7cf01c424746ed5744bf1@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r74d0b359408fff31f87445261f0ee13bdfcac7d66f6b8e846face321@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r74d0b359408fff31f87445261f0ee13bdfcac7d66f6b8e846face321@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/ra15d63c54dc6474b29f72ae4324bcb03038758545b3ab800845de7a1@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/ra15d63c54dc6474b29f72ae4324bcb03038758545b3ab800845de7a1@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rc263bfc5b53afcb7e849605478d73f5556eb0c00d1f912084e407289@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/rc263bfc5b53afcb7e849605478d73f5556eb0c00d1f912084e407289@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rfa094029c959da0f7c8cd7dc9c4e59d21b03457bf0cedf6c93e1bb0a@%3Cdev.druid.apache.org%3E" > https://lists.apache.org/thread.html/rfa094029c959da0f7c8cd7dc9c4e59d21b03457bf0cedf6c93e1bb0a@%3Cdev.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rfc5c478053ff808671aef170f3d9fc9d05cc1fab8fb64431edc66103@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/rfc5c478053ff808671aef170f3d9fc9d05cc1fab8fb64431edc66103@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3749" > https://nvd.nist.gov/vuln/detail/CVE-2021-3749< / a > < br > < a href = "https://www.npmjs.com/package/axios" > https://www.npmjs.com/package/axios< / a > < br > < / details > |
| dicer | CVE-2022-24434 | HIGH | 0.3.0 | | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-wm7h-9275-46v2" > https://github.com/advisories/GHSA-wm7h-9275-46v2< / a > < br > < a href = "https://github.com/mscdex/busboy/issues/250" > https://github.com/mscdex/busboy/issues/250< / a > < br > < a href = "https://github.com/mscdex/dicer/pull/22" > https://github.com/mscdex/dicer/pull/22< / a > < br > < a href = "https://github.com/mscdex/dicer/pull/22/commits/b7fca2e93e8e9d4439d8acc5c02f5e54a0112dac" > https://github.com/mscdex/dicer/pull/22/commits/b7fca2e93e8e9d4439d8acc5c02f5e54a0112dac< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24434" > https://nvd.nist.gov/vuln/detail/CVE-2022-24434< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2838865" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2838865< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-DICER-2311764" > https://snyk.io/vuln/SNYK-JS-DICER-2311764< / a > < br > < / details > |
| ejs | CVE-2022-29078 | CRITICAL | 3.1.6 | 3.1.7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29078" > https://access.redhat.com/security/cve/CVE-2022-29078< / a > < br > < a href = "https://eslam.io/posts/ejs-server-side-template-injection-rce/" > https://eslam.io/posts/ejs-server-side-template-injection-rce/< / a > < br > < a href = "https://github.com/advisories/GHSA-phwq-j96m-2c2q" > https://github.com/advisories/GHSA-phwq-j96m-2c2q< / a > < br > < a href = "https://github.com/mde/ejs/commit/15ee698583c98dadc456639d6245580d17a24baf" > https://github.com/mde/ejs/commit/15ee698583c98dadc456639d6245580d17a24baf< / a > < br > < a href = "https://github.com/mde/ejs/releases" > https://github.com/mde/ejs/releases< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29078" > https://nvd.nist.gov/vuln/detail/CVE-2022-29078< / a > < br > < / details > |
| follow-redirects | CVE-2022-0155 | HIGH | 1.14.1 | 1.14.7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0155" > https://access.redhat.com/security/cve/CVE-2022-0155< / a > < br > < a href = "https://github.com/advisories/GHSA-74fj-2j2h-c42q" > https://github.com/advisories/GHSA-74fj-2j2h-c42q< / a > < br > < a href = "https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22" > https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22< / a > < br > < a href = "https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406" > https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406< / a > < br > < a href = "https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/" > https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0155" > https://nvd.nist.gov/vuln/detail/CVE-2022-0155< / a > < br > < / details > |
| follow-redirects | CVE-2022-0536 | MEDIUM | 1.14.1 | 1.14.8 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0536" > https://access.redhat.com/security/cve/CVE-2022-0536< / a > < br > < a href = "https://github.com/advisories/GHSA-pw2r-vq6v-hr8c" > https://github.com/advisories/GHSA-pw2r-vq6v-hr8c< / a > < br > < a href = "https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445" > https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445< / a > < br > < a href = "https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db" > https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0536" > https://nvd.nist.gov/vuln/detail/CVE-2022-0536< / a > < br > < / details > |
2022-06-23 02:37:10 +00:00
| got | CVE-2022-33987 | MEDIUM | 9.6.0 | 11.8.5, 12.1.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-pfrx-2q88-qq97" > https://github.com/advisories/GHSA-pfrx-2q88-qq97< / a > < br > < a href = "https://github.com/sindresorhus/got/commit/861ccd9ac2237df762a9e2beed7edd88c60782dc" > https://github.com/sindresorhus/got/commit/861ccd9ac2237df762a9e2beed7edd88c60782dc< / a > < br > < a href = "https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0" > https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0< / a > < br > < a href = "https://github.com/sindresorhus/got/pull/2047" > https://github.com/sindresorhus/got/pull/2047< / a > < br > < a href = "https://github.com/sindresorhus/got/releases/tag/v11.8.5" > https://github.com/sindresorhus/got/releases/tag/v11.8.5< / a > < br > < a href = "https://github.com/sindresorhus/got/releases/tag/v12.1.0" > https://github.com/sindresorhus/got/releases/tag/v12.1.0< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-33987" > https://nvd.nist.gov/vuln/detail/CVE-2022-33987< / a > < br > < / details > |
2022-06-21 09:54:34 +00:00
| json-schema | CVE-2021-3918 | CRITICAL | 0.2.3 | 0.4.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3918" > https://access.redhat.com/security/cve/CVE-2021-3918< / a > < br > < a href = "https://github.com/advisories/GHSA-896r-f27r-55mw" > https://github.com/advisories/GHSA-896r-f27r-55mw< / a > < br > < a href = "https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741" > https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741< / a > < br > < a href = "https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a" > https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a< / a > < br > < a href = "https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa" > https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa< / a > < br > < a href = "https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9" > https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3918.html" > https://linux.oracle.com/cve/CVE-2021-3918.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3918" > https://nvd.nist.gov/vuln/detail/CVE-2021-3918< / a > < br > < / details > |
| minimist | CVE-2021-44906 | CRITICAL | 1.2.5 | 1.2.6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44906" > https://access.redhat.com/security/cve/CVE-2021-44906< / a > < br > < a href = "https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip" > https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip< / a > < br > < a href = "https://github.com/advisories/GHSA-xvch-5gv4-984h" > https://github.com/advisories/GHSA-xvch-5gv4-984h< / a > < br > < a href = "https://github.com/substack/minimist/blob/master/index.js#L69" > https://github.com/substack/minimist/blob/master/index.js#L69< / a > < br > < a href = "https://github.com/substack/minimist/issues/164" > https://github.com/substack/minimist/issues/164< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-44906" > https://nvd.nist.gov/vuln/detail/CVE-2021-44906< / a > < br > < a href = "https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068" > https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068< / a > < br > < / details > |
| moment | CVE-2022-24785 | HIGH | 2.29.1 | 2.29.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-24785" > https://access.redhat.com/security/cve/CVE-2022-24785< / a > < br > < a href = "https://github.com/advisories/GHSA-8hfj-j24r-96c4" > https://github.com/advisories/GHSA-8hfj-j24r-96c4< / a > < br > < a href = "https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5" > https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5< / a > < br > < a href = "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" > https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" > https://nvd.nist.gov/vuln/detail/CVE-2022-24785< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220513-0006/" > https://security.netapp.com/advisory/ntap-20220513-0006/< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-09" > https://www.tenable.com/security/tns-2022-09< / a > < br > < / details > |
| nanoid | CVE-2021-23566 | MEDIUM | 3.1.24 | 3.1.31 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-23566" > https://access.redhat.com/security/cve/CVE-2021-23566< / a > < br > < a href = "https://gist.github.com/artalar/bc6d1eb9a3477d15d2772e876169a444" > https://gist.github.com/artalar/bc6d1eb9a3477d15d2772e876169a444< / a > < br > < a href = "https://github.com/advisories/GHSA-qrpm-p2h7-hrv2" > https://github.com/advisories/GHSA-qrpm-p2h7-hrv2< / a > < br > < a href = "https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575" > https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575< / a > < br > < a href = "https://github.com/ai/nanoid/pull/328" > https://github.com/ai/nanoid/pull/328< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23566" > https://nvd.nist.gov/vuln/detail/CVE-2021-23566< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-NANOID-2332193" > https://snyk.io/vuln/SNYK-JS-NANOID-2332193< / a > < br > < / details > |
**gobinary**
| No Vulnerabilities found |
|:---------------------------------|
**gobinary**
| No Vulnerabilities found |
|:---------------------------------|
**gobinary**
| No Vulnerabilities found |
|:---------------------------------|
**gobinary**
| No Vulnerabilities found |
|:---------------------------------|
**gobinary**
| No Vulnerabilities found |
|:---------------------------------|