diff --git a/stable/clarkson/1.0.23/CHANGELOG.md b/stable/clarkson/1.0.24/CHANGELOG.md similarity index 90% rename from stable/clarkson/1.0.23/CHANGELOG.md rename to stable/clarkson/1.0.24/CHANGELOG.md index 5ecfbd5a650..047ff724b22 100644 --- a/stable/clarkson/1.0.23/CHANGELOG.md +++ b/stable/clarkson/1.0.24/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [clarkson-1.0.24](https://github.com/truecharts/apps/compare/clarkson-1.0.23...clarkson-1.0.24) (2022-05-29) + +#### Feat + +* move to stable ([#2790](https://github.com/truecharts/apps/issues/2790)) + + + ### [clarkson-1.0.23](https://github.com/truecharts/apps/compare/clarkson-1.0.22...clarkson-1.0.23) (2022-05-29) @@ -88,12 +97,3 @@ ### [clarkson-1.0.16](https://github.com/truecharts/apps/compare/clarkson-1.0.15...clarkson-1.0.16) (2022-05-04) #### Chore - -* update helm general non-major helm releases ([#2605](https://github.com/truecharts/apps/issues/2605)) - - - - -### [clarkson-1.0.15](https://github.com/truecharts/apps/compare/clarkson-1.0.14...clarkson-1.0.15) (2022-04-26) - -#### Chore diff --git a/stable/clarkson/1.0.23/CONFIG.md b/stable/clarkson/1.0.24/CONFIG.md similarity index 100% rename from stable/clarkson/1.0.23/CONFIG.md rename to stable/clarkson/1.0.24/CONFIG.md diff --git a/stable/clarkson/1.0.23/Chart.lock b/stable/clarkson/1.0.24/Chart.lock similarity index 85% rename from stable/clarkson/1.0.23/Chart.lock rename to stable/clarkson/1.0.24/Chart.lock index c9300589fbb..875ee3987e7 100644 --- a/stable/clarkson/1.0.23/Chart.lock +++ b/stable/clarkson/1.0.24/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.truecharts.org/ version: 2.0.78 digest: sha256:bba5795f0d4387b99090f6e96a6a526a3d8cf5943716d77e9d09a99f6dd956c9 -generated: "2022-05-29T18:15:45.790874772Z" +generated: "2022-05-29T20:16:45.643123633Z" diff --git a/stable/clarkson/1.0.23/Chart.yaml b/stable/clarkson/1.0.24/Chart.yaml similarity index 98% rename from stable/clarkson/1.0.23/Chart.yaml rename to stable/clarkson/1.0.24/Chart.yaml index e9739fd2b5e..cd5516c90d1 100644 --- a/stable/clarkson/1.0.23/Chart.yaml +++ b/stable/clarkson/1.0.24/Chart.yaml @@ -26,7 +26,7 @@ name: clarkson sources: - https://github.com/linuxserver/Clarkson - https://hub.docker.com/r/linuxserver/clarkson -version: 1.0.23 +version: 1.0.24 annotations: truecharts.org/catagories: | - vehicle diff --git a/stable/clarkson/1.0.23/README.md b/stable/clarkson/1.0.24/README.md similarity index 100% rename from stable/clarkson/1.0.23/README.md rename to stable/clarkson/1.0.24/README.md diff --git a/stable/clarkson/1.0.23/app-readme.md b/stable/clarkson/1.0.24/app-readme.md similarity index 100% rename from stable/clarkson/1.0.23/app-readme.md rename to stable/clarkson/1.0.24/app-readme.md diff --git a/stable/clarkson/1.0.23/charts/common-9.3.19.tgz b/stable/clarkson/1.0.24/charts/common-9.3.19.tgz similarity index 100% rename from stable/clarkson/1.0.23/charts/common-9.3.19.tgz rename to stable/clarkson/1.0.24/charts/common-9.3.19.tgz diff --git a/stable/clarkson/1.0.23/charts/mariadb-2.0.78.tgz b/stable/clarkson/1.0.24/charts/mariadb-2.0.78.tgz similarity index 100% rename from stable/clarkson/1.0.23/charts/mariadb-2.0.78.tgz rename to stable/clarkson/1.0.24/charts/mariadb-2.0.78.tgz diff --git a/stable/clarkson/1.0.23/helm-values.md b/stable/clarkson/1.0.24/helm-values.md similarity index 100% rename from stable/clarkson/1.0.23/helm-values.md rename to stable/clarkson/1.0.24/helm-values.md diff --git a/stable/clarkson/1.0.23/ix_values.yaml b/stable/clarkson/1.0.24/ix_values.yaml similarity index 80% rename from stable/clarkson/1.0.23/ix_values.yaml rename to stable/clarkson/1.0.24/ix_values.yaml index d4fab6ceb67..4ba04cd049e 100644 --- a/stable/clarkson/1.0.23/ix_values.yaml +++ b/stable/clarkson/1.0.24/ix_values.yaml @@ -19,14 +19,11 @@ service: main: ports: main: - port: 10228 + port: 10244 targetPort: 3000 -# See more environment variables in the clarkson documentation -# https://github.com/linuxserver/docker-clarkson#parameters env: - MYSQL_USERNAME: clarkson - + MYSQL_USERNAME: "{{ .Values.mariadb.mariadbUsername }}" envValueFrom: MYSQL_HOST: diff --git a/stable/clarkson/1.0.23/questions.yaml b/stable/clarkson/1.0.24/questions.yaml similarity index 99% rename from stable/clarkson/1.0.23/questions.yaml rename to stable/clarkson/1.0.24/questions.yaml index 2ceca26d6d3..99cd00e05f6 100644 --- a/stable/clarkson/1.0.23/questions.yaml +++ b/stable/clarkson/1.0.24/questions.yaml @@ -376,7 +376,7 @@ questions: description: "This port exposes the container port on the service" schema: type: int - default: 10228 + default: 10244 required: true - variable: advanced label: "Show Advanced settings" diff --git a/stable/clarkson/1.0.23/security.md b/stable/clarkson/1.0.24/security.md similarity index 100% rename from stable/clarkson/1.0.23/security.md rename to stable/clarkson/1.0.24/security.md diff --git a/stable/clarkson/1.0.23/templates/common.yaml b/stable/clarkson/1.0.24/templates/common.yaml similarity index 100% rename from stable/clarkson/1.0.23/templates/common.yaml rename to stable/clarkson/1.0.24/templates/common.yaml diff --git a/stable/clarkson/1.0.23/values.yaml b/stable/clarkson/1.0.24/values.yaml similarity index 100% rename from stable/clarkson/1.0.23/values.yaml rename to stable/clarkson/1.0.24/values.yaml diff --git a/stable/commento-plusplus/1.0.0/CHANGELOG.md b/stable/commento-plusplus/1.0.0/CHANGELOG.md new file mode 100644 index 00000000000..6347c5f98d6 --- /dev/null +++ b/stable/commento-plusplus/1.0.0/CHANGELOG.md @@ -0,0 +1,18 @@ +# Changelog
+ + + +### [commento-plusplus-1.0.0](https://github.com/truecharts/apps/compare/commento-plusplus-0.0.1...commento-plusplus-1.0.0) (2022-05-29) + +#### Feat + +* move to stable ([#2790](https://github.com/truecharts/apps/issues/2790)) + + + + +### commento-plusplus-0.0.1 (2022-05-29) + +#### Feat + +* Add commento-plusplus ([#2780](https://github.com/truecharts/apps/issues/2780)) diff --git a/stable/commento-plusplus/1.0.0/Chart.lock b/stable/commento-plusplus/1.0.0/Chart.lock new file mode 100644 index 00000000000..af72a863652 --- /dev/null +++ b/stable/commento-plusplus/1.0.0/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +- name: postgresql + repository: https://charts.truecharts.org/ + version: 7.0.79 +digest: sha256:bfa2285bfb14d27d570012b68aeafba3ee553854d2bff12af4fa83ae71f1154f +generated: "2022-05-29T20:16:45.819807317Z" diff --git a/stable/commento-plusplus/1.0.0/Chart.yaml b/stable/commento-plusplus/1.0.0/Chart.yaml new file mode 100644 index 00000000000..683c8fa252d --- /dev/null +++ b/stable/commento-plusplus/1.0.0/Chart.yaml @@ -0,0 +1,30 @@ +apiVersion: v2 +appVersion: "1.8.7" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +- condition: postgresql.enabled + name: postgresql + repository: https://charts.truecharts.org/ + version: 7.0.79 +description: Commento++ is a free, open source, fast & lightweight comments box that you can embed in your static website instead of Disqus. +home: https://github.com/truecharts/apps/tree/master/charts/stable/commento-plusplus +icon: https://truecharts.org/_static/img/appicons/commento-plusplus.png +keywords: +- commento +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: commento-plusplus +sources: +- https://github.com/souramoo/commentoplusplus +- https://hub.docker.com/r/caroga/commentoplusplus +version: 1.0.0 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/commento-plusplus/1.0.0/README.md b/stable/commento-plusplus/1.0.0/README.md new file mode 100644 index 00000000000..f04484d2c13 --- /dev/null +++ b/stable/commento-plusplus/1.0.0/README.md @@ -0,0 +1,39 @@ +# Introduction + +Commento++ is a free, open source, fast & lightweight comments box that you can embed in your static website instead of Disqus. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://charts.truecharts.org/ | postgresql | 7.0.79 | +| https://library-charts.truecharts.org | common | 9.3.19 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/commento-plusplus/1.0.0/app-readme.md b/stable/commento-plusplus/1.0.0/app-readme.md new file mode 100644 index 00000000000..0df07aad03a --- /dev/null +++ b/stable/commento-plusplus/1.0.0/app-readme.md @@ -0,0 +1,3 @@ +Commento++ is a free, open source, fast & lightweight comments box that you can embed in your static website instead of Disqus. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/commento-plusplus/1.0.0/charts/common-9.3.19.tgz b/stable/commento-plusplus/1.0.0/charts/common-9.3.19.tgz new file mode 100644 index 00000000000..3f20020f4d5 Binary files /dev/null and b/stable/commento-plusplus/1.0.0/charts/common-9.3.19.tgz differ diff --git a/stable/commento-plusplus/1.0.0/charts/postgresql-7.0.79.tgz b/stable/commento-plusplus/1.0.0/charts/postgresql-7.0.79.tgz new file mode 100644 index 00000000000..f14a51d22a2 Binary files /dev/null and b/stable/commento-plusplus/1.0.0/charts/postgresql-7.0.79.tgz differ diff --git a/stable/commento-plusplus/1.0.0/ix_values.yaml b/stable/commento-plusplus/1.0.0/ix_values.yaml new file mode 100644 index 00000000000..e1f90c25ec7 --- /dev/null +++ b/stable/commento-plusplus/1.0.0/ix_values.yaml @@ -0,0 +1,31 @@ +image: + repository: caroga/commentoplusplus + tag: v1.8.7@sha256:ccbc099c69700a6f973e5fd583520f8ff3293c5742d179cf3517eec49ee84f4b + pullPolicy: IfNotPresent + +env: + COMMENTO_PORT: "{{ .Values.service.main.ports.main.port }}" + # User Defined + COMMENTO_FORBID_NEW_OWNERS: false + COMMENTO_GZIP_STATIC: true + COMMENTO_ORIGIN: "http://localhost:8080" + COMMENTO_ENABLE_WILDCARDS: true + COMMENTO_ENABLE_LOGGING: false + +envValueFrom: + COMMENTO_POSTGRES: + secretKeyRef: + name: dbcreds + key: urlnossl + +service: + main: + ports: + main: + port: 10240 + +postgresql: + enabled: true + existingSecret: "dbcreds" + postgresqlUsername: comment-plusplus + postgresqlDatabase: comment-plusplus diff --git a/stable/commento-plusplus/1.0.0/questions.yaml b/stable/commento-plusplus/1.0.0/questions.yaml new file mode 100644 index 00000000000..8767224385e --- /dev/null +++ b/stable/commento-plusplus/1.0.0/questions.yaml @@ -0,0 +1,2312 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + additional_attrs: true + type: dict + attrs: + - variable: COMMENTO_ORIGIN + label: "COMMENTO_ORIGIN" + description: "This should be set to the subdomain or the IP address hosting Commento. All API requests will go to this server. This may include subdirectories if Commento is hosted behind a reverse proxy, for example. Include the protocol in the value to use HTTP/HTTPS." + schema: + type: string + default: "" + - variable: COMMENTO_FORBID_NEW_OWNERS + label: "COMMENTO_FORBID_NEW_OWNERS" + description: "Used to disable new dashboard registrations. Useful if you are the only person using Commento on your server. Does not impact the creation of accounts for your readers." + schema: + type: boolean + default: false + - variable: COMMENTO_GZIP_STATIC + label: "COMMENTO_GZIP_STATIC" + schema: + type: boolean + default: true + - variable: COMMENTO_ENABLE_WILDCARDS + label: "COMMENTO_ENABLE_WILDCARDS" + description: "Allows use of wildcards in domain names in the admin dashboard. (e.g. if you share your commento instance with more than one admin/allow new registrations)" + schema: + type: boolean + default: true + - variable: COMMENTO_ENABLE_LOGGING + label: "COMMENTO_ENABLE_LOGGING" + description: "Should we log every page view? This will allow you to see stats but will fill up your free postgres database quite quickly." + schema: + type: boolean + default: false + - variable: smpt_config + label: "Enable SMTP" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: SMTP_SKIP_HOST_VERIFY + label: "SMTP_SKIP_HOST_VERIFY" + description: "Allows skipping of host verification for SMTP email sending." + schema: + type: boolean + default: false + - variable: COMMENTO_SMTP_USERNAME + label: "COMMENTO_SMTP_USERNAME" + description: "SMTP credentials and configuration the server should use to send emails." + schema: + type: string + default: "" + - variable: COMMENTO_SMTP_PASSWORD + label: "COMMENTO_SMTP_PASSWORD" + description: "SMTP credentials and configuration the server should use to send emails." + schema: + type: string + private: true + default: "" + - variable: COMMENTO_SMTP_HOST + label: "COMMENTO_SMTP_HOST" + description: "SMTP credentials and configuration the server should use to send emails." + schema: + type: string + default: "" + - variable: COMMENTO_SMTP_FROM_ADDRESS + label: "COMMENTO_SMTP_FROM_ADDRESS" + description: "SMTP credentials and configuration the server should use to send emails." + schema: + type: string + default: "" + - variable: COMMENTO_SMTP_PORT + label: "COMMENTO_SMTP_PORT" + description: "SMTP credentials and configuration the server should use to send emails." + schema: + type: int + default: 587 + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10240 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 10240 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: true + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: "The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/commento-plusplus/1.0.0/security.md b/stable/commento-plusplus/1.0.0/security.md new file mode 100644 index 00000000000..81ede92cabb --- /dev/null +++ b/stable/commento-plusplus/1.0.0/security.md @@ -0,0 +1,699 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: commento-plusplus/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


StatefulSet 'RELEASE-NAME-postgresql' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-commento-plusplus' of Deployment 'RELEASE-NAME-commento-plusplus' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-commento-plusplus' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-commento-plusplus' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-commento-plusplus' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-commento-plusplus' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1 + caroga/commentoplusplus:v1.8.7@sha256:ccbc099c69700a6f973e5fd583520f8ff3293c5742d179cf3517eec49ee84f4b + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1 (debian 10.12) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| dpkg | CVE-2022-1664 | MEDIUM | 1.19.7 | 1.19.8 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be
https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html
https://lists.debian.org/debian-security-announce/2022/msg00115.html
https://ubuntu.com/security/notices/USN-5446-1
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcom-err2 | CVE-2022-1304 | HIGH | 1.44.5-1+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.5 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://access.redhat.com/security/cve/CVE-2019-13627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://access.redhat.com/security/cve/CVE-2020-11080
https://errata.almalinux.org/8/ALSA-2020-2852.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://nvd.nist.gov/vuln/detail/CVE-2020-11080
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://access.redhat.com/security/cve/CVE-2019-9893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19603
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19645
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13631
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19244
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-11656
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://access.redhat.com/security/cve/CVE-2019-17498
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
https://nvd.nist.gov/vuln/detail/CVE-2019-17498
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u4 | |
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u4 | |
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| locales | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| +| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1 (debian 10.12) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| dpkg | CVE-2022-1664 | MEDIUM | 1.19.7 | 1.19.8 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be
https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html
https://lists.debian.org/debian-security-announce/2022/msg00115.html
https://ubuntu.com/security/notices/USN-5446-1
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcom-err2 | CVE-2022-1304 | HIGH | 1.44.5-1+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.5 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://access.redhat.com/security/cve/CVE-2019-13627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://access.redhat.com/security/cve/CVE-2020-11080
https://errata.almalinux.org/8/ALSA-2020-2852.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://nvd.nist.gov/vuln/detail/CVE-2020-11080
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://access.redhat.com/security/cve/CVE-2019-9893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19603
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19645
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13631
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19244
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-11656
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://access.redhat.com/security/cve/CVE-2019-17498
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
https://nvd.nist.gov/vuln/detail/CVE-2019-17498
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u4 | |
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u4 | |
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| locales | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| +| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
| + + +#### Container: caroga/commentoplusplus:v1.8.7@sha256:ccbc099c69700a6f973e5fd583520f8ff3293c5742d179cf3517eec49ee84f4b (debian 11.3) + + +**debian** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| diff --git a/stable/commento-plusplus/1.0.0/templates/common.yaml b/stable/commento-plusplus/1.0.0/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/stable/commento-plusplus/1.0.0/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/stable/commento-plusplus/1.0.0/values.yaml b/stable/commento-plusplus/1.0.0/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/commento-plusplus/item.yaml b/stable/commento-plusplus/item.yaml new file mode 100644 index 00000000000..ad2c1825cd6 --- /dev/null +++ b/stable/commento-plusplus/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/commento-plusplus.png +categories: +- media + diff --git a/stable/fileflows/1.0.0/CHANGELOG.md b/stable/fileflows/1.0.0/CHANGELOG.md new file mode 100644 index 00000000000..50abddfd4e0 --- /dev/null +++ b/stable/fileflows/1.0.0/CHANGELOG.md @@ -0,0 +1,18 @@ +# Changelog
+ + + +### [fileflows-1.0.0](https://github.com/truecharts/apps/compare/fileflows-0.0.1...fileflows-1.0.0) (2022-05-29) + +#### Feat + +* move to stable ([#2790](https://github.com/truecharts/apps/issues/2790)) + + + + +### fileflows-0.0.1 (2022-05-29) + +#### Feat + +* add fileflows ([#2782](https://github.com/truecharts/apps/issues/2782)) diff --git a/stable/fileflows/1.0.0/Chart.lock b/stable/fileflows/1.0.0/Chart.lock new file mode 100644 index 00000000000..ff6ccf27f53 --- /dev/null +++ b/stable/fileflows/1.0.0/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +digest: sha256:e46103d57a30e2ea0a853b41314e8ba213e9ee88882734c471030c16702946d3 +generated: "2022-05-29T20:16:42.282375719Z" diff --git a/stable/fileflows/1.0.0/Chart.yaml b/stable/fileflows/1.0.0/Chart.yaml new file mode 100644 index 00000000000..09c73684bef --- /dev/null +++ b/stable/fileflows/1.0.0/Chart.yaml @@ -0,0 +1,26 @@ +apiVersion: v2 +appVersion: "0.6.2" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +description: An application that lets you automatically process files through a simple rule flow. +home: https://github.com/truecharts/apps/tree/master/charts/stable/fileflows +icon: https://truecharts.org/_static/img/appicons/fileflows.png +keywords: +- fileflows +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: fileflows +sources: +- https://github.com/revenz/FileFlows +- https://hub.docker.com/r/revenz/fileflows +version: 1.0.0 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/fileflows/1.0.0/README.md b/stable/fileflows/1.0.0/README.md new file mode 100644 index 00000000000..6dc862d919e --- /dev/null +++ b/stable/fileflows/1.0.0/README.md @@ -0,0 +1,38 @@ +# Introduction + +An application that lets you automatically process files through a simple rule flow. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 9.3.19 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/fileflows/1.0.0/app-readme.md b/stable/fileflows/1.0.0/app-readme.md new file mode 100644 index 00000000000..b8cdbfc89c1 --- /dev/null +++ b/stable/fileflows/1.0.0/app-readme.md @@ -0,0 +1,3 @@ +An application that lets you automatically process files through a simple rule flow. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/fileflows/1.0.0/charts/common-9.3.19.tgz b/stable/fileflows/1.0.0/charts/common-9.3.19.tgz new file mode 100644 index 00000000000..3f20020f4d5 Binary files /dev/null and b/stable/fileflows/1.0.0/charts/common-9.3.19.tgz differ diff --git a/stable/fileflows/1.0.0/ix_values.yaml b/stable/fileflows/1.0.0/ix_values.yaml new file mode 100644 index 00000000000..47c9bdacb09 --- /dev/null +++ b/stable/fileflows/1.0.0/ix_values.yaml @@ -0,0 +1,33 @@ +image: + repository: revenz/fileflows + tag: 0.6.2@sha256:c786e3544517067a9761f078422baa1a3981246721094a30811bd0022e56c4b9 + pullPolicy: IfNotPresent + +securityContext: + readOnlyRootFilesystem: false + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +service: + main: + ports: + main: + port: 10242 + targetPort: 5000 + +persistence: + data: + enabled: true + mountPath: "/app/Data" + logs: + enabled: true + mountPath: "/app/Logs" + temp: + enabled: true + mountPath: "/temp" + media: + enabled: true + mountPath: "/media" diff --git a/stable/fileflows/1.0.0/questions.yaml b/stable/fileflows/1.0.0/questions.yaml new file mode 100644 index 00000000000..c03e97f6762 --- /dev/null +++ b/stable/fileflows/1.0.0/questions.yaml @@ -0,0 +1,2894 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + # Docker specific env + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10242 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 5000 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: data + label: "App Data Storage" + description: "Stores the Application Data." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: logs + label: "App Logs Storage" + description: "Stores the Application Logs." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: temp + label: "App Temp Storage" + description: "Stores the Application Temp." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: media + label: "App Media Storage" + description: "Stores the Application Data." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: "The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/fileflows/1.0.0/security.md b/stable/fileflows/1.0.0/security.md new file mode 100644 index 00000000000..c4d01cfb63c --- /dev/null +++ b/stable/fileflows/1.0.0/security.md @@ -0,0 +1,190 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: fileflows/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-fileflows' of Deployment 'RELEASE-NAME-fileflows' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-fileflows' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-fileflows' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-fileflows' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-fileflows' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-fileflows' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-fileflows' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-fileflows' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-fileflows' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-fileflows' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-fileflows' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-fileflows' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-fileflows' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + revenz/fileflows:0.6.2@sha256:c786e3544517067a9761f078422baa1a3981246721094a30811bd0022e56c4b9 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: revenz/fileflows:0.6.2@sha256:c786e3544517067a9761f078422baa1a3981246721094a30811bd0022e56c4b9 (ubuntu 22.04) + + +**ubuntu** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| aom-tools | CVE-2020-36129 | MEDIUM | 3.3.0-1 | |
Expand...https://aomedia.googlesource.com/aom/+/7a20d10027fd91fbe11e38182a1d45238e102c4a%5E%21/#F0 (v3.0.0)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2912&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36129
| +| aom-tools | CVE-2020-36130 | MEDIUM | 3.3.0-1 | |
Expand...https://aomedia.googlesource.com/aom/+/be4ee75fd762d361d0679cc892e4c74af8140093%5E%21/#F0 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2905&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
| +| aom-tools | CVE-2020-36131 | MEDIUM | 3.3.0-1 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
| +| aom-tools | CVE-2020-36133 | MEDIUM | 3.3.0-1 | |
Expand...https://aomedia.googlesource.com/aom/+/5c9bc4181071684d157fc47c736acf6c69a85d85 (v3.0.0)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2913&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
| +| aom-tools | CVE-2020-36135 | MEDIUM | 3.3.0-1 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2910&q=&can=1
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
| +| coreutils | CVE-2016-2781 | LOW | 8.32-4.1ubuntu1 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| dpkg | CVE-2022-1664 | MEDIUM | 1.21.1ubuntu2 | 1.21.1ubuntu2.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be
https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html
https://lists.debian.org/debian-security-announce/2022/msg00115.html
https://ubuntu.com/security/notices/USN-5446-1
| +| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.46.5-2ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| git | CVE-2018-1000021 | LOW | 1:2.34.1-1ubuntu1.2 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://access.redhat.com/security/cve/CVE-2018-1000021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| +| git-man | CVE-2018-1000021 | LOW | 1:2.34.1-1ubuntu1.2 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://access.redhat.com/security/cve/CVE-2018-1000021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| +| libaom3 | CVE-2020-36129 | MEDIUM | 3.3.0-1 | |
Expand...https://aomedia.googlesource.com/aom/+/7a20d10027fd91fbe11e38182a1d45238e102c4a%5E%21/#F0 (v3.0.0)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2912&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36129
| +| libaom3 | CVE-2020-36130 | MEDIUM | 3.3.0-1 | |
Expand...https://aomedia.googlesource.com/aom/+/be4ee75fd762d361d0679cc892e4c74af8140093%5E%21/#F0 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2905&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
| +| libaom3 | CVE-2020-36131 | MEDIUM | 3.3.0-1 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
| +| libaom3 | CVE-2020-36133 | MEDIUM | 3.3.0-1 | |
Expand...https://aomedia.googlesource.com/aom/+/5c9bc4181071684d157fc47c736acf6c69a85d85 (v3.0.0)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2913&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
| +| libaom3 | CVE-2020-36135 | MEDIUM | 3.3.0-1 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2910&q=&can=1
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
| +| libapparmor1 | CVE-2016-1585 | MEDIUM | 3.0.4-2ubuntu2 | |
Expand...https://bugs.launchpad.net/apparmor/+bug/1597017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-1585
| +| libavcodec58 | CVE-2022-1475 | MEDIUM | 7:4.4.1-3ubuntu5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2076764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1475
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=757da974b21833529cc41bdcc9684c29660cdfa8
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=e9e2ddbc6c78cc18b76093617f82c920e58a8d1f (n4.4.2)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=fa2e4afe8d0a23fac37392ef6506cfc9841f8d3d (n4.3.4)
https://trac.ffmpeg.org/ticket/9651
| +| libavdevice58 | CVE-2022-1475 | MEDIUM | 7:4.4.1-3ubuntu5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2076764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1475
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=757da974b21833529cc41bdcc9684c29660cdfa8
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=e9e2ddbc6c78cc18b76093617f82c920e58a8d1f (n4.4.2)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=fa2e4afe8d0a23fac37392ef6506cfc9841f8d3d (n4.3.4)
https://trac.ffmpeg.org/ticket/9651
| +| libavfilter7 | CVE-2022-1475 | MEDIUM | 7:4.4.1-3ubuntu5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2076764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1475
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=757da974b21833529cc41bdcc9684c29660cdfa8
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=e9e2ddbc6c78cc18b76093617f82c920e58a8d1f (n4.4.2)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=fa2e4afe8d0a23fac37392ef6506cfc9841f8d3d (n4.3.4)
https://trac.ffmpeg.org/ticket/9651
| +| libavformat58 | CVE-2022-1475 | MEDIUM | 7:4.4.1-3ubuntu5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2076764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1475
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=757da974b21833529cc41bdcc9684c29660cdfa8
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=e9e2ddbc6c78cc18b76093617f82c920e58a8d1f (n4.4.2)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=fa2e4afe8d0a23fac37392ef6506cfc9841f8d3d (n4.3.4)
https://trac.ffmpeg.org/ticket/9651
| +| libavutil56 | CVE-2022-1475 | MEDIUM | 7:4.4.1-3ubuntu5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2076764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1475
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=757da974b21833529cc41bdcc9684c29660cdfa8
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=e9e2ddbc6c78cc18b76093617f82c920e58a8d1f (n4.4.2)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=fa2e4afe8d0a23fac37392ef6506cfc9841f8d3d (n4.3.4)
https://trac.ffmpeg.org/ticket/9651
| +| libcairo-gobject2 | CVE-2017-7475 | LOW | 1.16.0-5ubuntu2 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://access.redhat.com/security/cve/CVE-2017-7475
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| +| libcairo-gobject2 | CVE-2018-18064 | LOW | 1.16.0-5ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-18064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo-gobject2 | CVE-2019-6461 | LOW | 1.16.0-5ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-6461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6461
| +| libcairo2 | CVE-2017-7475 | LOW | 1.16.0-5ubuntu2 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://access.redhat.com/security/cve/CVE-2017-7475
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| +| libcairo2 | CVE-2018-18064 | LOW | 1.16.0-5ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-18064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2019-6461 | LOW | 1.16.0-5ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-6461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6461
| +| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.46.5-2ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.46.5-2ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libflac8 | CVE-2020-0499 | LOW | 1.3.3-2build2 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-0499
https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/
https://source.android.com/security/bulletin/pixel/2020-12-01
| +| libfreetype6 | CVE-2022-27404 | MEDIUM | 2.11.1+dfsg-1build1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27404
| +| libfreetype6 | CVE-2022-27405 | LOW | 2.11.1+dfsg-1build1 | |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27405
| +| libfreetype6 | CVE-2022-27406 | LOW | 2.11.1+dfsg-1build1 | |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27406
| +| libgdk-pixbuf-2.0-0 | CVE-2021-44648 | MEDIUM | 2.42.8+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-44648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/
https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
| +| libgdk-pixbuf2.0-bin | CVE-2021-44648 | MEDIUM | 2.42.8+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-44648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/
https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
| +| libgdk-pixbuf2.0-common | CVE-2021-44648 | MEDIUM | 2.42.8+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-44648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/
https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
| +| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.1+dfsg-3ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
| +| libgpac11 | CVE-2018-1000100 | MEDIUM | 2.0.0+dfsg1-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000100
https://github.com/gpac/gpac/issues/994
https://ubuntu.com/security/notices/USN-3926-1
https://usn.ubuntu.com/3926-1/
| +| libgpac11 | CVE-2021-28300 | MEDIUM | 2.0.0+dfsg1-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28300
https://github.com/gpac/gpac/issues/1702
| +| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1build3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://access.redhat.com/security/cve/CVE-2017-9937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.5-0 | CVE-2022-29155 | MEDIUM | 2.5.11+dfsg-1~exp1ubuntu3 | 2.5.11+dfsg-1~exp1ubuntu3.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | MEDIUM | 2.5.11+dfsg-1~exp1ubuntu3 | 2.5.11+dfsg-1~exp1ubuntu3.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libopenjp2-7 | CVE-2019-6988 | LOW | 2.4.0-6 | |
Expand...http://www.securityfocus.com/bid/106785
https://access.redhat.com/security/cve/CVE-2019-6988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
| +| libopenjp2-7 | CVE-2021-29338 | LOW | 2.4.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-29338
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://github.com/uclouvain/openjpeg/pull/1395
https://github.com/uclouvain/openjpeg/pull/1396
https://github.com/uclouvain/openjpeg/pull/1397
https://github.com/uclouvain/openjpeg/pull/1398
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
| +| libopenjp2-7 | CVE-2021-3575 | LOW | 2.4.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3575
https://bugzilla.redhat.com/show_bug.cgi?id=1957616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
https://github.com/uclouvain/openjpeg/issues/1347
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
https://ubuntu.com/security/CVE-2021-3575
| +| libopenmpt0 | CVE-2019-17113 | MEDIUM | 0.6.1-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00044.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17113
https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe
https://github.com/OpenMPT/openmpt/compare/libopenmpt-0.3.18...libopenmpt-0.3.19
https://github.com/OpenMPT/openmpt/compare/libopenmpt-0.4.8...libopenmpt-0.4.9
https://lists.debian.org/debian-lts-announce/2020/08/msg00003.html
https://source.openmpt.org/browse/openmpt/trunk/OpenMPT/?op=revision&rev=12127&peg=12127
https://www.debian.org/security/2020/dsa-4729
| +| libpcre2-16-0 | CVE-2022-1586 | LOW | 10.39-3build1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| +| libpcre2-16-0 | CVE-2022-1587 | LOW | 10.39-3build1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| +| libpcre2-8-0 | CVE-2022-1586 | LOW | 10.39-3build1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| +| libpcre2-8-0 | CVE-2022-1587 | LOW | 10.39-3build1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13build5 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13build5 | 2:8.39-13ubuntu0.22.04.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libperl5.34 | CVE-2020-16156 | MEDIUM | 5.34.0-3ubuntu1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| libpolkit-agent-1-0 | CVE-2016-2568 | LOW | 0.105-33 | |
Expand...http://seclists.org/oss-sec/2016/q1/443
http://www.openwall.com/lists/oss-security/2016/02/26/3
https://access.redhat.com/security/cve/CVE-2016-2568
https://access.redhat.com/security/cve/cve-2016-2568
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062
https://bugzilla.redhat.com/show_bug.cgi?id=1300746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2568
https://ubuntu.com/security/CVE-2016-2568
| +| libpolkit-gobject-1-0 | CVE-2016-2568 | LOW | 0.105-33 | |
Expand...http://seclists.org/oss-sec/2016/q1/443
http://www.openwall.com/lists/oss-security/2016/02/26/3
https://access.redhat.com/security/cve/CVE-2016-2568
https://access.redhat.com/security/cve/cve-2016-2568
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062
https://bugzilla.redhat.com/show_bug.cgi?id=1300746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2568
https://ubuntu.com/security/CVE-2016-2568
| +| libpostproc55 | CVE-2022-1475 | MEDIUM | 7:4.4.1-3ubuntu5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2076764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1475
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=757da974b21833529cc41bdcc9684c29660cdfa8
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=e9e2ddbc6c78cc18b76093617f82c920e58a8d1f (n4.4.2)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=fa2e4afe8d0a23fac37392ef6506cfc9841f8d3d (n4.3.4)
https://trac.ffmpeg.org/ticket/9651
| +| libpython3.10-minimal | CVE-2015-20107 | LOW | 3.10.4-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| libpython3.10-stdlib | CVE-2015-20107 | LOW | 3.10.4-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| libqt5core5a | CVE-2022-25255 | MEDIUM | 5.15.3+dfsg-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-25255
https://codereview.qt-project.org/c/qt/qtbase/+/393113
https://codereview.qt-project.org/c/qt/qtbase/+/394914
https://codereview.qt-project.org/c/qt/qtbase/+/396020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255
https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff
https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
| +| libsndfile1 | CVE-2021-4156 | LOW | 1.0.31-2build1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4156
https://bugzilla.redhat.com/show_bug.cgi?id=2027690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4156
https://errata.almalinux.org/8/ALSA-2022-1968.html
https://github.com/libsndfile/libsndfile/issues/731
https://github.com/libsndfile/libsndfile/pull/732/commits/4c30646abf7834e406f7e2429c70bc254e18beab
https://linux.oracle.com/cve/CVE-2021-4156.html
https://linux.oracle.com/errata/ELSA-2022-1968.html
https://ubuntu.com/security/notices/USN-5409-1
| +| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.37.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| +| libsqlite3-0 | CVE-2020-9849 | LOW | 3.37.2-2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| +| libsqlite3-0 | CVE-2020-9991 | LOW | 3.37.2-2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| +| libss2 | CVE-2022-1304 | MEDIUM | 1.46.5-2ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libswresample3 | CVE-2022-1475 | MEDIUM | 7:4.4.1-3ubuntu5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2076764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1475
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=757da974b21833529cc41bdcc9684c29660cdfa8
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=e9e2ddbc6c78cc18b76093617f82c920e58a8d1f (n4.4.2)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=fa2e4afe8d0a23fac37392ef6506cfc9841f8d3d (n4.3.4)
https://trac.ffmpeg.org/ticket/9651
| +| libswscale5 | CVE-2022-1475 | MEDIUM | 7:4.4.1-3ubuntu5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2076764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1475
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=757da974b21833529cc41bdcc9684c29660cdfa8
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=e9e2ddbc6c78cc18b76093617f82c920e58a8d1f (n4.4.2)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=fa2e4afe8d0a23fac37392ef6506cfc9841f8d3d (n4.3.4)
https://trac.ffmpeg.org/ticket/9651
| +| libtiff5 | CVE-2022-1354 | MEDIUM | 4.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354
https://gitlab.com/libtiff/libtiff/-/issues/319
| +| libtiff5 | CVE-2018-10126 | LOW | 4.3.0-6 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://access.redhat.com/security/cve/CVE-2018-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-2ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| logsave | CVE-2022-1304 | MEDIUM | 1.46.5-2ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| openssh-client | CVE-2020-14145 | LOW | 1:8.9p1-3 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://access.redhat.com/security/cve/CVE-2020-14145
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14145
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
| +| openssh-client | CVE-2021-41617 | LOW | 1:8.9p1-3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json
https://access.redhat.com/security/cve/CVE-2021-41617
https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://errata.almalinux.org/8/ALSA-2022-2013.html
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2022-2013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://nvd.nist.gov/vuln/detail/CVE-2021-41617
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-2ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| patch | CVE-2018-6952 | LOW | 2.7.6-7build2 | |
Expand...http://www.securityfocus.com/bid/103047
https://access.redhat.com/errata/RHSA-2019:2033
https://access.redhat.com/security/cve/CVE-2018-6952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952
https://linux.oracle.com/cve/CVE-2018-6952.html
https://linux.oracle.com/errata/ELSA-2019-2033.html
https://nvd.nist.gov/vuln/detail/CVE-2018-6952
https://savannah.gnu.org/bugs/index.php?53133
https://security.gentoo.org/glsa/201904-17
| +| patch | CVE-2021-45261 | LOW | 2.7.6-7build2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261
https://savannah.gnu.org/bugs/?61685
| +| perl | CVE-2020-16156 | MEDIUM | 5.34.0-3ubuntu1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2020-16156 | MEDIUM | 5.34.0-3ubuntu1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-modules-5.34 | CVE-2020-16156 | MEDIUM | 5.34.0-3ubuntu1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| pkexec | CVE-2016-2568 | LOW | 0.105-33 | |
Expand...http://seclists.org/oss-sec/2016/q1/443
http://www.openwall.com/lists/oss-security/2016/02/26/3
https://access.redhat.com/security/cve/CVE-2016-2568
https://access.redhat.com/security/cve/cve-2016-2568
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062
https://bugzilla.redhat.com/show_bug.cgi?id=1300746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2568
https://ubuntu.com/security/CVE-2016-2568
| +| policykit-1 | CVE-2016-2568 | LOW | 0.105-33 | |
Expand...http://seclists.org/oss-sec/2016/q1/443
http://www.openwall.com/lists/oss-security/2016/02/26/3
https://access.redhat.com/security/cve/CVE-2016-2568
https://access.redhat.com/security/cve/cve-2016-2568
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062
https://bugzilla.redhat.com/show_bug.cgi?id=1300746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2568
https://ubuntu.com/security/CVE-2016-2568
| +| polkitd | CVE-2016-2568 | LOW | 0.105-33 | |
Expand...http://seclists.org/oss-sec/2016/q1/443
http://www.openwall.com/lists/oss-security/2016/02/26/3
https://access.redhat.com/security/cve/CVE-2016-2568
https://access.redhat.com/security/cve/cve-2016-2568
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062
https://bugzilla.redhat.com/show_bug.cgi?id=1300746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2568
https://ubuntu.com/security/CVE-2016-2568
| +| python3-httplib2 | CVE-2021-21240 | LOW | 0.20.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-21240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21240
https://github.com/advisories/GHSA-93xj-8mrv-444m
https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc
https://github.com/httplib2/httplib2/pull/182
https://github.com/httplib2/httplib2/security/advisories/GHSA-93xj-8mrv-444m
https://nvd.nist.gov/vuln/detail/CVE-2021-21240
https://pypi.org/project/httplib2
| +| python3.10 | CVE-2015-20107 | LOW | 3.10.4-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| python3.10-minimal | CVE-2015-20107 | LOW | 3.10.4-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| tar | CVE-2019-9923 | LOW | 1.34+dfsg-1build3 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| wget | CVE-2021-31879 | MEDIUM | 1.21.2-2ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-31879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879
https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
https://nvd.nist.gov/vuln/detail/CVE-2021-31879
https://savannah.gnu.org/bugs/?56909
https://security.netapp.com/advisory/ntap-20210618-0002/
| +| x11-common | CVE-2012-1093 | LOW | 1:7.7+23ubuntu2 | |
Expand...http://vladz.devzero.fr/012_x11-common-vuln.html
http://www.openwall.com/lists/oss-security/2012/02/29/1
http://www.openwall.com/lists/oss-security/2012/03/01/1
https://access.redhat.com/security/cve/cve-2012-1093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1093
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2012-1093
| diff --git a/stable/fileflows/1.0.0/templates/common.yaml b/stable/fileflows/1.0.0/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/stable/fileflows/1.0.0/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/stable/fileflows/1.0.0/values.yaml b/stable/fileflows/1.0.0/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/fileflows/item.yaml b/stable/fileflows/item.yaml new file mode 100644 index 00000000000..48a088218d5 --- /dev/null +++ b/stable/fileflows/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/fileflows.png +categories: +- media + diff --git a/stable/homarr/1.0.0/CHANGELOG.md b/stable/homarr/1.0.0/CHANGELOG.md new file mode 100644 index 00000000000..b0d95c88588 --- /dev/null +++ b/stable/homarr/1.0.0/CHANGELOG.md @@ -0,0 +1,18 @@ +# Changelog
+ + + +### [homarr-1.0.0](https://github.com/truecharts/apps/compare/homarr-0.0.1...homarr-1.0.0) (2022-05-29) + +#### Feat + +* move to stable ([#2790](https://github.com/truecharts/apps/issues/2790)) + + + + +### homarr-0.0.1 (2022-05-29) + +#### Feat + +* add homarr ([#2779](https://github.com/truecharts/apps/issues/2779)) diff --git a/stable/homarr/1.0.0/Chart.lock b/stable/homarr/1.0.0/Chart.lock new file mode 100644 index 00000000000..8d77d246b00 --- /dev/null +++ b/stable/homarr/1.0.0/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +digest: sha256:e46103d57a30e2ea0a853b41314e8ba213e9ee88882734c471030c16702946d3 +generated: "2022-05-29T20:16:42.357504279Z" diff --git a/stable/homarr/1.0.0/Chart.yaml b/stable/homarr/1.0.0/Chart.yaml new file mode 100644 index 00000000000..d946b92e09c --- /dev/null +++ b/stable/homarr/1.0.0/Chart.yaml @@ -0,0 +1,25 @@ +apiVersion: v2 +appVersion: "0.5.2" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +description: Homarr is a simple and lightweight homepage for your server, that helps you easily access all of your services in one place. +home: https://github.com/truecharts/apps/tree/master/charts/stable/homarr +icon: https://truecharts.org/_static/img/appicons/homarr .png +keywords: +- dashboard +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: homarr +sources: +- https://github.com/ajnart/homarr +version: 1.0.0 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/homarr/1.0.0/README.md b/stable/homarr/1.0.0/README.md new file mode 100644 index 00000000000..4d044c12855 --- /dev/null +++ b/stable/homarr/1.0.0/README.md @@ -0,0 +1,37 @@ +# Introduction + +Homarr is a simple and lightweight homepage for your server, that helps you easily access all of your services in one place. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 9.3.19 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/homarr/1.0.0/app-readme.md b/stable/homarr/1.0.0/app-readme.md new file mode 100644 index 00000000000..a1ff20163ec --- /dev/null +++ b/stable/homarr/1.0.0/app-readme.md @@ -0,0 +1,3 @@ +Homarr is a simple and lightweight homepage for your server, that helps you easily access all of your services in one place. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/homarr/1.0.0/charts/common-9.3.19.tgz b/stable/homarr/1.0.0/charts/common-9.3.19.tgz new file mode 100644 index 00000000000..3f20020f4d5 Binary files /dev/null and b/stable/homarr/1.0.0/charts/common-9.3.19.tgz differ diff --git a/stable/homarr/1.0.0/ix_values.yaml b/stable/homarr/1.0.0/ix_values.yaml new file mode 100644 index 00000000000..64c090b3197 --- /dev/null +++ b/stable/homarr/1.0.0/ix_values.yaml @@ -0,0 +1,19 @@ +image: + repository: ghcr.io/ajnart/homarr + tag: 0.5.2@sha256:e9ff0f28f8ec8f7cb7a883b3eed4a85fec6990a9fa987f57c914d553d560c6e4 + pullPolicy: IfNotPresent + +service: + main: + ports: + main: + port: 10245 + targetPort: 7575 + +persistence: + config: + enabled: true + mountPath: "/app/data/configs" + icons: + enabled: true + mountPath: "/app/public/icons" diff --git a/stable/homarr/1.0.0/questions.yaml b/stable/homarr/1.0.0/questions.yaml new file mode 100644 index 00000000000..e90676b0643 --- /dev/null +++ b/stable/homarr/1.0.0/questions.yaml @@ -0,0 +1,2568 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10245 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 7575 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: icons + label: "App Icon Storage" + description: "Stores the Application Icons." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: true + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: "The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/homarr/1.0.0/security.md b/stable/homarr/1.0.0/security.md new file mode 100644 index 00000000000..170421a8c72 --- /dev/null +++ b/stable/homarr/1.0.0/security.md @@ -0,0 +1,109 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: homarr/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-homarr' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-homarr' of Deployment 'RELEASE-NAME-homarr' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-homarr' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-homarr' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-homarr' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-homarr' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-homarr' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-homarr' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-homarr' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-homarr' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-homarr' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-homarr' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-homarr' of Deployment 'RELEASE-NAME-homarr' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-homarr' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-homarr' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-homarr' of Deployment 'RELEASE-NAME-homarr' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-homarr' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-homarr' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-homarr' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-homarr' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/ajnart/homarr:0.5.2@sha256:e9ff0f28f8ec8f7cb7a883b3eed4a85fec6990a9fa987f57c914d553d560c6e4 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/ajnart/homarr:0.5.2@sha256:e9ff0f28f8ec8f7cb7a883b3eed4a85fec6990a9fa987f57c914d553d560c6e4 (alpine 3.15.4) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**node-pkg** + + +| No Vulnerabilities found | +|:---------------------------------| diff --git a/stable/homarr/1.0.0/templates/common.yaml b/stable/homarr/1.0.0/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/stable/homarr/1.0.0/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/stable/homarr/1.0.0/values.yaml b/stable/homarr/1.0.0/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/homarr/item.yaml b/stable/homarr/item.yaml new file mode 100644 index 00000000000..96cad56fddc --- /dev/null +++ b/stable/homarr/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/homarr .png +categories: +- media + diff --git a/stable/jellyseerr/1.0.0/CHANGELOG.md b/stable/jellyseerr/1.0.0/CHANGELOG.md new file mode 100644 index 00000000000..0a6c8296f50 --- /dev/null +++ b/stable/jellyseerr/1.0.0/CHANGELOG.md @@ -0,0 +1,18 @@ +# Changelog
+ + + +### [jellyseerr-1.0.0](https://github.com/truecharts/apps/compare/jellyseerr-0.0.1...jellyseerr-1.0.0) (2022-05-29) + +#### Feat + +* move to stable ([#2790](https://github.com/truecharts/apps/issues/2790)) + + + + +### jellyseerr-0.0.1 (2022-05-29) + +#### Feat + +* add jellyseerr ([#2781](https://github.com/truecharts/apps/issues/2781)) diff --git a/stable/jellyseerr/1.0.0/Chart.lock b/stable/jellyseerr/1.0.0/Chart.lock new file mode 100644 index 00000000000..406c39d445d --- /dev/null +++ b/stable/jellyseerr/1.0.0/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +digest: sha256:e46103d57a30e2ea0a853b41314e8ba213e9ee88882734c471030c16702946d3 +generated: "2022-05-29T20:17:06.044038082Z" diff --git a/stable/jellyseerr/1.0.0/Chart.yaml b/stable/jellyseerr/1.0.0/Chart.yaml new file mode 100644 index 00000000000..fa4ef1d8fab --- /dev/null +++ b/stable/jellyseerr/1.0.0/Chart.yaml @@ -0,0 +1,26 @@ +apiVersion: v2 +appVersion: "1.1.0" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +description: TEMPLATEREPLACEME +home: https://github.com/truecharts/apps/tree/master/charts/stable/jellyseerr +icon: https://truecharts.org/_static/img/appicons/jellyseerr.png +keywords: +- jellyseerr +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: jellyseerr +sources: +- https://github.com/Fallenbagel/jellyseerr +- https://hub.docker.com/r/fallenbagel/jellyseerr +version: 1.0.0 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/jellyseerr/1.0.0/README.md b/stable/jellyseerr/1.0.0/README.md new file mode 100644 index 00000000000..609b36c03c6 --- /dev/null +++ b/stable/jellyseerr/1.0.0/README.md @@ -0,0 +1,38 @@ +# Introduction + +TEMPLATEREPLACEME + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 9.3.19 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/jellyseerr/1.0.0/app-readme.md b/stable/jellyseerr/1.0.0/app-readme.md new file mode 100644 index 00000000000..19b9fd7cc6a --- /dev/null +++ b/stable/jellyseerr/1.0.0/app-readme.md @@ -0,0 +1,3 @@ +TEMPLATEREPLACEME + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/jellyseerr/1.0.0/charts/common-9.3.19.tgz b/stable/jellyseerr/1.0.0/charts/common-9.3.19.tgz new file mode 100644 index 00000000000..3f20020f4d5 Binary files /dev/null and b/stable/jellyseerr/1.0.0/charts/common-9.3.19.tgz differ diff --git a/stable/jellyseerr/1.0.0/ix_values.yaml b/stable/jellyseerr/1.0.0/ix_values.yaml new file mode 100644 index 00000000000..af1d5643ffe --- /dev/null +++ b/stable/jellyseerr/1.0.0/ix_values.yaml @@ -0,0 +1,21 @@ +image: + repository: fallenbagel/jellyseerr + tag: 1.1.0@sha256:23f922ec6fe6ed3fdd486aec95b5a7760b29d03fdfcd9a78367c18f1d92b1638 + pullPolicy: IfNotPresent + +env: + PORT: "{{ .Values.service.main.ports.main.port }}" + # User Defined + JELLYFIN_TYPE: "" + LOG_LEVEL: "info" + +service: + main: + ports: + main: + port: 10241 + +persistence: + config: + enabled: true + mountPath: "/app/config" diff --git a/stable/jellyseerr/1.0.0/questions.yaml b/stable/jellyseerr/1.0.0/questions.yaml new file mode 100644 index 00000000000..d130178229b --- /dev/null +++ b/stable/jellyseerr/1.0.0/questions.yaml @@ -0,0 +1,2433 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + additional_attrs: true + type: dict + attrs: + - variable: JELLYFIN_TYPE + label: "JELLYFIN_TYPE" + description: "For Emby users set this to emby, otherwise leave it blank" + schema: + type: string + default: "" + enum: + - value: "" + description: "" + - value: "emby" + description: "emby" + - variable: LOG_LEVEL + label: "LOG_LEVEL" + schema: + type: string + default: "info" + enum: + - value: "info" + description: "info" + - value: "debug" + description: "debug" + + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10241 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 10241 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: true + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: "The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/jellyseerr/1.0.0/security.md b/stable/jellyseerr/1.0.0/security.md new file mode 100644 index 00000000000..407cc107c0b --- /dev/null +++ b/stable/jellyseerr/1.0.0/security.md @@ -0,0 +1,115 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: jellyseerr/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-jellyseerr' of Deployment 'RELEASE-NAME-jellyseerr' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-jellyseerr' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-jellyseerr' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-jellyseerr' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-jellyseerr' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-jellyseerr' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + fallenbagel/jellyseerr:1.1.0@sha256:23f922ec6fe6ed3fdd486aec95b5a7760b29d03fdfcd9a78367c18f1d92b1638 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: fallenbagel/jellyseerr:1.1.0@sha256:23f922ec6fe6ed3fdd486aec95b5a7760b29d03fdfcd9a78367c18f1d92b1638 (alpine 3.15.4) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**node-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| ansi-regex | CVE-2021-3807 | HIGH | 3.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| ansi-regex | CVE-2021-3807 | HIGH | 5.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| dicer | CVE-2022-24434 | HIGH | 0.2.5 | |
Expand...https://github.com/advisories/GHSA-wm7h-9275-46v2
https://github.com/mscdex/busboy/issues/250
https://github.com/mscdex/dicer/pull/22
https://github.com/mscdex/dicer/pull/22/commits/b7fca2e93e8e9d4439d8acc5c02f5e54a0112dac
https://nvd.nist.gov/vuln/detail/CVE-2022-24434
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2838865
https://snyk.io/vuln/SNYK-JS-DICER-2311764
| +| minimist | CVE-2021-44906 | CRITICAL | 1.2.5 | 1.2.6 |
Expand...https://access.redhat.com/security/cve/CVE-2021-44906
https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip
https://github.com/advisories/GHSA-xvch-5gv4-984h
https://github.com/substack/minimist/blob/master/index.js#L69
https://github.com/substack/minimist/issues/164
https://nvd.nist.gov/vuln/detail/CVE-2021-44906
https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068
| +| moment | CVE-2022-24785 | HIGH | 2.29.1 | 2.29.2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-24785
https://github.com/advisories/GHSA-8hfj-j24r-96c4
https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5
https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4
https://nvd.nist.gov/vuln/detail/CVE-2022-24785
https://security.netapp.com/advisory/ntap-20220513-0006/
https://www.tenable.com/security/tns-2022-09
| +| sqlite3 | CVE-2022-21227 | HIGH | 5.0.2 | 5.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21227
https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a
https://github.com/TryGhost/node-sqlite3/issues/1440
https://github.com/TryGhost/node-sqlite3/issues/1449
https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-9qrh-qjmc-5w2p
https://github.com/advisories/GHSA-9qrh-qjmc-5w2p
https://nvd.nist.gov/vuln/detail/CVE-2022-21227
https://security.snyk.io/vuln/SNYK-JS-SQLITE3-2388645
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470
https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645
| diff --git a/stable/jellyseerr/1.0.0/templates/common.yaml b/stable/jellyseerr/1.0.0/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/stable/jellyseerr/1.0.0/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/stable/jellyseerr/1.0.0/values.yaml b/stable/jellyseerr/1.0.0/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/jellyseerr/item.yaml b/stable/jellyseerr/item.yaml new file mode 100644 index 00000000000..88bb10102bd --- /dev/null +++ b/stable/jellyseerr/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/jellyseerr.png +categories: +- media + diff --git a/stable/meshroom/1.0.0/CHANGELOG.md b/stable/meshroom/1.0.0/CHANGELOG.md new file mode 100644 index 00000000000..57c9e1492a5 --- /dev/null +++ b/stable/meshroom/1.0.0/CHANGELOG.md @@ -0,0 +1,18 @@ +# Changelog
+ + + +### [meshroom-1.0.0](https://github.com/truecharts/apps/compare/meshroom-0.0.1...meshroom-1.0.0) (2022-05-29) + +#### Feat + +* move to stable ([#2790](https://github.com/truecharts/apps/issues/2790)) + + + + +### meshroom-0.0.1 (2022-05-29) + +#### Feat + +* add meshroom ([#2783](https://github.com/truecharts/apps/issues/2783)) diff --git a/stable/meshroom/1.0.0/Chart.lock b/stable/meshroom/1.0.0/Chart.lock new file mode 100644 index 00000000000..d0c00fdd4ab --- /dev/null +++ b/stable/meshroom/1.0.0/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +digest: sha256:e46103d57a30e2ea0a853b41314e8ba213e9ee88882734c471030c16702946d3 +generated: "2022-05-29T20:17:23.116834672Z" diff --git a/stable/meshroom/1.0.0/Chart.yaml b/stable/meshroom/1.0.0/Chart.yaml new file mode 100644 index 00000000000..b6c87b9cfa6 --- /dev/null +++ b/stable/meshroom/1.0.0/Chart.yaml @@ -0,0 +1,26 @@ +apiVersion: v2 +appVersion: "2.4.0-cent" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +description: Meshroom is a free, open-source 3D Reconstruction Software based on the AliceVision Photogrammetric Computer Vision framework. +home: https://github.com/truecharts/apps/tree/master/charts/stable/meshroom +icon: https://truecharts.org/_static/img/appicons/meshroom.png +keywords: +- meshroom +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: meshroom +sources: +- https://github.com/alicevision/meshroom +- https://hub.docker.com/r/alicevision/meshroom +version: 1.0.0 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/meshroom/1.0.0/README.md b/stable/meshroom/1.0.0/README.md new file mode 100644 index 00000000000..5f10a4b07d9 --- /dev/null +++ b/stable/meshroom/1.0.0/README.md @@ -0,0 +1,38 @@ +# Introduction + +Meshroom is a free, open-source 3D Reconstruction Software based on the AliceVision Photogrammetric Computer Vision framework. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 9.3.19 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/meshroom/1.0.0/app-readme.md b/stable/meshroom/1.0.0/app-readme.md new file mode 100644 index 00000000000..577d148dc2d --- /dev/null +++ b/stable/meshroom/1.0.0/app-readme.md @@ -0,0 +1,3 @@ +Meshroom is a free, open-source 3D Reconstruction Software based on the AliceVision Photogrammetric Computer Vision framework. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/meshroom/1.0.0/charts/common-9.3.19.tgz b/stable/meshroom/1.0.0/charts/common-9.3.19.tgz new file mode 100644 index 00000000000..3f20020f4d5 Binary files /dev/null and b/stable/meshroom/1.0.0/charts/common-9.3.19.tgz differ diff --git a/stable/meshroom/1.0.0/ix_values.yaml b/stable/meshroom/1.0.0/ix_values.yaml new file mode 100644 index 00000000000..09a84888d4c --- /dev/null +++ b/stable/meshroom/1.0.0/ix_values.yaml @@ -0,0 +1,32 @@ +image: + repository: alicevision/meshroom + tag: 2021.1.0-av2.4.0-centos7-cuda10.2@sha256:1cadc1a8f5edd8ebbf8de20df5cf1d6e44ee0aad4ebbb8939018fe0beadc2dad + pullPolicy: IfNotPresent + +securityContext: + readOnlyRootFilesystem: false + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +probes: + liveness: + enabled: false + readiness: + enabled: false + startup: + enabled: false + +service: + main: + ports: + main: + port: 10243 + targetPort: 22 + +persistence: + data: + enabled: true + mountPath: "/data" diff --git a/stable/meshroom/1.0.0/questions.yaml b/stable/meshroom/1.0.0/questions.yaml new file mode 100644 index 00000000000..1dbec17737a --- /dev/null +++ b/stable/meshroom/1.0.0/questions.yaml @@ -0,0 +1,2405 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + # Docker specific env + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10243 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 22 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: data + label: "App Data Storage" + description: "Stores the Application Data." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: "The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/meshroom/1.0.0/security.md b/stable/meshroom/1.0.0/security.md new file mode 100644 index 00000000000..9b95b26ad8a --- /dev/null +++ b/stable/meshroom/1.0.0/security.md @@ -0,0 +1,2103 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: meshroom/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-meshroom' of Deployment 'RELEASE-NAME-meshroom' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-meshroom' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-meshroom' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-meshroom' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-meshroom' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-meshroom' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-meshroom' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-meshroom' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-meshroom' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-meshroom' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-meshroom' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-meshroom' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + alicevision/meshroom:2021.1.0-av2.4.0-centos7-cuda10.2@sha256:1cadc1a8f5edd8ebbf8de20df5cf1d6e44ee0aad4ebbb8939018fe0beadc2dad + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: alicevision/meshroom:2021.1.0-av2.4.0-centos7-cuda10.2@sha256:1cadc1a8f5edd8ebbf8de20df5cf1d6e44ee0aad4ebbb8939018fe0beadc2dad (centos 7.7.1908) + + +**centos** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| audit-libs | CVE-2015-5186 | MEDIUM | 2.8.5-4.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2015/08/13/9
http://www.securityfocus.com/bid/76840
https://access.redhat.com/security/cve/CVE-2015-5186
https://bugzilla.redhat.com/show_bug.cgi?id=1251621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5186
https://fedorahosted.org/audit/changeset/1122
https://people.redhat.com/sgrubb/audit/ChangeLog
| +| audit-libs-python | CVE-2015-5186 | MEDIUM | 2.8.5-4.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2015/08/13/9
http://www.securityfocus.com/bid/76840
https://access.redhat.com/security/cve/CVE-2015-5186
https://bugzilla.redhat.com/show_bug.cgi?id=1251621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5186
https://fedorahosted.org/audit/changeset/1122
https://people.redhat.com/sgrubb/audit/ChangeLog
| +| bash | CVE-2012-6711 | MEDIUM | 4.2.46-33.el7 | |
Expand...http://git.savannah.gnu.org/cgit/bash.git/commit/?h=devel&id=863d31ae775d56b785dc5b0105b6d251515d81d5
http://www.securityfocus.com/bid/108824
https://access.redhat.com/security/cve/CVE-2012-6711
https://bugzilla.redhat.com/show_bug.cgi?id=1721071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6711
https://support.f5.com/csp/article/K05122252
https://support.f5.com/csp/article/K05122252?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4180-1
https://usn.ubuntu.com/4180-1/
| +| bash | CVE-2019-9924 | MEDIUM | 4.2.46-33.el7 | 4.2.46-34.el7 |
Expand...http://git.savannah.gnu.org/cgit/bash.git/tree/CHANGES?h=bash-4.4-testing#n65
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00049.html
https://access.redhat.com/security/cve/CVE-2019-9924
https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1803441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9924
https://linux.oracle.com/cve/CVE-2019-9924.html
https://linux.oracle.com/errata/ELSA-2020-1113.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00028.html
https://lists.gnu.org/archive/html/bug-bash/2017-03/msg00077.html
https://security.netapp.com/advisory/ntap-20190411-0001/
https://ubuntu.com/security/notices/USN-4058-1
https://ubuntu.com/security/notices/USN-4058-2
https://usn.ubuntu.com/4058-1/
https://usn.ubuntu.com/4058-2/
| +| bash | CVE-2019-18276 | LOW | 4.2.46-33.el7 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bind-license | CVE-2020-8616 | HIGH | 32:9.11.4-9.P2.el7 | 32:9.11.4-16.P2.el7_8.6 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
http://www.nxnsattack.com
http://www.openwall.com/lists/oss-security/2020/05/19/4
https://access.redhat.com/security/cve/CVE-2020-8616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616
https://kb.isc.org/docs/cve-2020-8616
https://linux.oracle.com/cve/CVE-2020-8616.html
https://linux.oracle.com/errata/ELSA-2020-2383.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/
https://security.netapp.com/advisory/ntap-20200522-0002/
https://ubuntu.com/security/notices/USN-4365-1
https://ubuntu.com/security/notices/USN-4365-2
https://usn.ubuntu.com/4365-1/
https://usn.ubuntu.com/4365-2/
https://www.debian.org/security/2020/dsa-4689
https://www.synology.com/security/advisory/Synology_SA_20_12
https://www.theregister.co.uk/2020/05/21/nxnaattack_bug_disclosed/
| +| bind-license | CVE-2020-8617 | HIGH | 32:9.11.4-9.P2.el7 | 32:9.11.4-16.P2.el7_8.6 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
http://packetstormsecurity.com/files/157836/BIND-TSIG-Denial-Of-Service.html
http://www.openwall.com/lists/oss-security/2020/05/19/4
https://access.redhat.com/security/cve/CVE-2020-8617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617
https://kb.isc.org/docs/cve-2020-8617
https://linux.oracle.com/cve/CVE-2020-8617.html
https://linux.oracle.com/errata/ELSA-2020-2383.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/
https://security.netapp.com/advisory/ntap-20200522-0002/
https://ubuntu.com/security/notices/USN-4365-1
https://ubuntu.com/security/notices/USN-4365-2
https://usn.ubuntu.com/4365-1/
https://usn.ubuntu.com/4365-2/
https://www.debian.org/security/2020/dsa-4689
| +| bind-license | CVE-2020-8625 | HIGH | 32:9.11.4-9.P2.el7 | 32:9.11.4-26.P2.el7_9.4 |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/1
http://www.openwall.com/lists/oss-security/2021/02/20/2
https://access.redhat.com/security/cve/CVE-2020-8625
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625
https://kb.isc.org/docs/cve-2020-8625
https://kb.isc.org/v1/docs/cve-2020-8625
https://linux.oracle.com/cve/CVE-2020-8625.html
https://linux.oracle.com/errata/ELSA-2021-9117.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBTPWRQWRQEJNWY4NHO4WLS4KLJ3ERHZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYXAF7G45RXDVNUTWWCI2CVTHRZ67LST/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QWCMBOSZOJIIET7BWTRYS3HLX5TSDKHX/
https://nvd.nist.gov/vuln/detail/CVE-2020-8625
https://security.netapp.com/advisory/ntap-20210319-0001/
https://ubuntu.com/security/notices/USN-4737-1
https://ubuntu.com/security/notices/USN-4737-2
https://www.debian.org/security/2021/dsa-4857
https://www.zerodayinitiative.com/advisories/ZDI-21-195/
| +| bind-license | CVE-2021-25215 | HIGH | 32:9.11.4-9.P2.el7 | 32:9.11.4-26.P2.el7_9.5 |
Expand...http://www.openwall.com/lists/oss-security/2021/04/29/1
http://www.openwall.com/lists/oss-security/2021/04/29/2
http://www.openwall.com/lists/oss-security/2021/04/29/3
http://www.openwall.com/lists/oss-security/2021/04/29/4
https://access.redhat.com/security/cve/CVE-2021-25215
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215
https://kb.isc.org/docs/cve-2021-25215
https://kb.isc.org/v1/docs/cve-2021-25215
https://linux.oracle.com/cve/CVE-2021-25215.html
https://linux.oracle.com/errata/ELSA-2021-9213.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/
https://nvd.nist.gov/vuln/detail/CVE-2021-25215
https://security.netapp.com/advisory/ntap-20210521-0006/
https://ubuntu.com/security/notices/USN-4929-1
https://www.debian.org/security/2021/dsa-4909
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| bind-license | CVE-2019-6477 | MEDIUM | 32:9.11.4-9.P2.el7 | 32:9.11.4-16.P2.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
https://access.redhat.com/security/cve/CVE-2019-6477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6477
https://kb.isc.org/docs/cve-2019-6477
https://linux.oracle.com/cve/CVE-2019-6477.html
https://linux.oracle.com/errata/ELSA-2020-1845.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3DEMNZMKR57VQJCG5ZN55ZGTQRL2TFQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGURMGQHX45KR4QDRCSUQHODUFOGNGAN/
https://support.f5.com/csp/article/K15840535?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4197-1
https://www.debian.org/security/2020/dsa-4689
https://www.synology.com/security/advisory/Synology_SA_19_39
| +| bind-license | CVE-2020-8622 | MEDIUM | 32:9.11.4-9.P2.el7 | 32:9.11.4-26.P2.el7_9.2 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-8622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622
https://kb.isc.org/docs/cve-2020-8622
https://linux.oracle.com/cve/CVE-2020-8622.html
https://linux.oracle.com/errata/ELSA-2020-5011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
https://nvd.nist.gov/vuln/detail/CVE-2020-8622
https://security.gentoo.org/glsa/202008-19
https://security.netapp.com/advisory/ntap-20200827-0003/
https://ubuntu.com/security/notices/USN-4468-1
https://ubuntu.com/security/notices/USN-4468-2
https://usn.ubuntu.com/4468-1/
https://usn.ubuntu.com/4468-2/
https://www.debian.org/security/2020/dsa-4752
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.synology.com/security/advisory/Synology_SA_20_19
| +| bind-license | CVE-2020-8623 | MEDIUM | 32:9.11.4-9.P2.el7 | 32:9.11.4-26.P2.el7_9.2 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-8623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623
https://kb.isc.org/docs/cve-2020-8623
https://linux.oracle.com/cve/CVE-2020-8623.html
https://linux.oracle.com/errata/ELSA-2020-5011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
https://nvd.nist.gov/vuln/detail/CVE-2020-8623
https://security.gentoo.org/glsa/202008-19
https://security.netapp.com/advisory/ntap-20200827-0003/
https://ubuntu.com/security/notices/USN-4468-1
https://usn.ubuntu.com/4468-1/
https://www.debian.org/security/2020/dsa-4752
https://www.synology.com/security/advisory/Synology_SA_20_19
| +| bind-license | CVE-2020-8624 | MEDIUM | 32:9.11.4-9.P2.el7 | 32:9.11.4-26.P2.el7_9.2 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-8624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624
https://kb.isc.org/docs/cve-2020-8624
https://linux.oracle.com/cve/CVE-2020-8624.html
https://linux.oracle.com/errata/ELSA-2020-5011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
https://nvd.nist.gov/vuln/detail/CVE-2020-8624
https://security.gentoo.org/glsa/202008-19
https://security.netapp.com/advisory/ntap-20200827-0003/
https://ubuntu.com/security/notices/USN-4468-1
https://usn.ubuntu.com/4468-1/
https://www.debian.org/security/2020/dsa-4752
https://www.synology.com/security/advisory/Synology_SA_20_19
| +| bind-license | CVE-2021-25214 | MEDIUM | 32:9.11.4-9.P2.el7 | 32:9.11.4-26.P2.el7_9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/04/29/1
http://www.openwall.com/lists/oss-security/2021/04/29/2
http://www.openwall.com/lists/oss-security/2021/04/29/3
http://www.openwall.com/lists/oss-security/2021/04/29/4
https://access.redhat.com/security/cve/CVE-2021-25214
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214
https://kb.isc.org/docs/cve-2021-25214
https://kb.isc.org/v1/docs/cve-2021-25214
https://linux.oracle.com/cve/CVE-2021-25214.html
https://linux.oracle.com/errata/ELSA-2021-4384.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/
https://nvd.nist.gov/vuln/detail/CVE-2021-25214
https://security.netapp.com/advisory/ntap-20210521-0006/
https://ubuntu.com/security/notices/USN-4929-1
https://www.debian.org/security/2021/dsa-4909
| +| bind-license | CVE-2021-25219 | MEDIUM | 32:9.11.4-9.P2.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-25219
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://errata.almalinux.org/8/ALSA-2022-2092.html
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://linux.oracle.com/cve/CVE-2021-25219.html
https://linux.oracle.com/errata/ELSA-2022-2092.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://nvd.nist.gov/vuln/detail/CVE-2021-25219
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| bind-license | CVE-2021-25220 | MEDIUM | 32:9.11.4-9.P2.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-25220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220
https://kb.isc.org/docs/CVE-2021-25220
https://kb.isc.org/v1/docs/cve-2021-25220
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2SXT7247QTKNBQ67MNRGZD23ADXU6E5U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VX3I2U3ICOIEI5Y7OYA6CHOLFMNH3YQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/API7U5E7SX7BAAVFNW366FFJGD6NZZKV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DE3UAVCPUMAKG27ZL5YXSP2C3RIOW3JZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-25220
https://security.netapp.com/advisory/ntap-20220408-0001/
https://ubuntu.com/security/notices/USN-5332-1
https://ubuntu.com/security/notices/USN-5332-2
| +| bind-license | CVE-2013-5661 | LOW | 32:9.11.4-9.P2.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-5661
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5661
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-5661
https://security-tracker.debian.org/tracker/CVE-2013-5661
| +| bind-license | CVE-2016-6170 | LOW | 32:9.11.4-9.P2.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/07/06/3
http://www.securityfocus.com/bid/91611
http://www.securitytracker.com/id/1036241
https://access.redhat.com/security/cve/CVE-2016-6170
https://bugzilla.redhat.com/show_bug.cgi?id=1353563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170
https://github.com/sischkg/xfer-limit/blob/master/README.md
https://kb.isc.org/article/AA-01390
https://kb.isc.org/article/AA-01390/0/Operational-Notification%3A-A-party-that-is-allowed-control-over-zone-data-can-overwhelm-a-server-by-transferring-huge-quantities-of-data.html
https://kb.isc.org/article/AA-01390/169/CVE-2016-6170
https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html
https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015073.html
https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015075.html
https://security.gentoo.org/glsa/201610-07
| +| bind-license | CVE-2018-5745 | LOW | 32:9.11.4-9.P2.el7 | 32:9.11.4-16.P2.el7 |
Expand...https://access.redhat.com/errata/RHSA-2019:3552
https://access.redhat.com/security/cve/CVE-2018-5745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5745
https://kb.isc.org/docs/cve-2018-5745
https://linux.oracle.com/cve/CVE-2018-5745.html
https://linux.oracle.com/errata/ELSA-2020-1061.html
https://ubuntu.com/security/notices/USN-3893-1
https://ubuntu.com/security/notices/USN-3893-2
| +| bind-license | CVE-2019-6465 | LOW | 32:9.11.4-9.P2.el7 | 32:9.11.4-16.P2.el7 |
Expand...https://access.redhat.com/errata/RHSA-2019:3552
https://access.redhat.com/security/cve/CVE-2019-6465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6465
https://kb.isc.org/docs/cve-2019-6465
https://linux.oracle.com/cve/CVE-2019-6465.html
https://linux.oracle.com/errata/ELSA-2020-1061.html
https://ubuntu.com/security/notices/USN-3893-1
https://ubuntu.com/security/notices/USN-3893-2
| +| binutils | CVE-2017-6965 | MEDIUM | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-6965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21137
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-6966 | MEDIUM | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-6966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21139
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2018-20673 | MEDIUM | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils | CVE-2019-9074 | MEDIUM | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-9074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
https://nvd.nist.gov/vuln/detail/CVE-2019-9074
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24235
https://support.f5.com/csp/article/K09092524
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9075 | MEDIUM | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-9075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
https://nvd.nist.gov/vuln/detail/CVE-2019-9075
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24236
https://support.f5.com/csp/article/K42059040
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9077 | MEDIUM | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/107139
https://access.redhat.com/security/cve/CVE-2019-9077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
https://nvd.nist.gov/vuln/detail/CVE-2019-9077
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24243
https://support.f5.com/csp/article/K00056379
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2020-16590 | MEDIUM | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-16590
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25821
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
| +| binutils | CVE-2020-16592 | MEDIUM | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-16592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils | CVE-2021-20197 | MEDIUM | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20197
https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20197
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils | CVE-2021-20294 | MEDIUM | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20294
https://bugzilla.redhat.com/show_bug.cgi?id=1943533
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-20294
https://sourceware.org/bugzilla/show_bug.cgi?id=26929
https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926
| +| binutils | CVE-2021-3487 | MEDIUM | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3487
https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-3487
https://ubuntu.com/security/notices/USN-5124-1
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils | CVE-2021-37322 | MEDIUM | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37322
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
https://nvd.nist.gov/vuln/detail/CVE-2021-37322
| +| binutils | CVE-2021-42574 | MEDIUM | 2.27-41.base.el7 | 2.27-44.base.el7_9.1 |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
| +| binutils | CVE-2021-45078 | MEDIUM | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://nvd.nist.gov/vuln/detail/CVE-2021-45078
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils | CVE-2014-9939 | LOW | 2.27-41.base.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2015/07/31/6
https://access.redhat.com/security/cve/CVE-2014-9939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9939
https://sourceware.org/bugzilla/show_bug.cgi?id=18750
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e27a9d5f22f9f7ead11738b1546d0b5c737266b
https://ubuntu.com/security/notices/USN-3367-1
| +| binutils | CVE-2015-8538 | LOW | 2.27-41.base.el7 | |
Expand...http://sourceforge.net/p/libdwarf/code/ci/da724a0bc5eec8e9ec0b0cb0c238a80e34466459/
http://www.openwall.com/lists/oss-security/2015/12/09/2
http://www.openwall.com/lists/oss-security/2015/12/10/3
https://access.redhat.com/security/cve/CVE-2015-8538
https://bugzilla.redhat.com/show_bug.cgi?id=1289385
https://bugzilla.redhat.com/show_bug.cgi?id=1291299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8538
| +| binutils | CVE-2016-2226 | LOW | 2.27-41.base.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
| +| binutils | CVE-2016-4487 | LOW | 2.27-41.base.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2016-4488 | LOW | 2.27-41.base.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2016-4489 | LOW | 2.27-41.base.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2016-4490 | LOW | 2.27-41.base.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2016-4491 | LOW | 2.27-41.base.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2016-4492 | LOW | 2.27-41.base.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2016-4493 | LOW | 2.27-41.base.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-12449 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-12449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12449
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-12451 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-12451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12451
https://sourceware.org/bugzilla/show_bug.cgi?id=21786
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-12452 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-12452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12452
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-12453 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-12453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12453
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-12454 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-12454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12454
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-12455 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-12455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12455
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-12456 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-12456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12456
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-12457 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-12457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12457
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-12458 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-12458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12458
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-12799 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/100292
https://access.redhat.com/security/cve/CVE-2017-12799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12799
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21933
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-12967 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/100462
https://access.redhat.com/security/cve/CVE-2017-12967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12967
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21962
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-13710 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/100499
https://access.redhat.com/security/cve/CVE-2017-13710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13710
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0c54f69295208331faab9bc5e995111a35672f9b
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d6f8dea6798528de0fc762409595251eeeb1f547
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-13716 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils | CVE-2017-13757 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/100532
https://access.redhat.com/security/cve/CVE-2017-13757
https://sourceware.org/bugzilla/show_bug.cgi?id=22018
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=90efb6422939ca031804266fba669f77c22a274a
| +| binutils | CVE-2017-14128 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/100623
https://access.redhat.com/security/cve/CVE-2017-14128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14128
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22059
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e8b60085eb3e6f2c41bc0c00c0d759fa7f72780
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-14129 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/100624
https://access.redhat.com/security/cve/CVE-2017-14129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14129
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22047
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e4f2723003859dc6b33ca0dadbc4a7659ebf1643
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-14130 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/100625
https://access.redhat.com/security/cve/CVE-2017-14130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14130
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22058
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=2a143b99fc4a5094a9cf128f3184d8e6818c8229
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-14529 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-14529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14529
https://sourceware.org/bugzilla/show_bug.cgi?id=22113
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4d465c689a8fb27212ef358d0aee89d60dee69a6
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=dcaaca89e8618eba35193c27afcb1cfa54f74582
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-14729 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-14729
https://blogs.gentoo.org/ago/2017/09/25/binutils-heap-based-buffer-overflow-in-_bfd_x86_elf_get_synthetic_symtab-elfxx-x86-c/
https://sourceware.org/bugzilla/show_bug.cgi?id=22170
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=56933f9e3e90eebf1018ed7417d6c1184b91db6b
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=61e3bf5f83f7e505b6bc51ef65426e5b31e6e360
| +| binutils | CVE-2017-14745 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-14745
https://sourceware.org/bugzilla/show_bug.cgi?id=22148
| +| binutils | CVE-2017-14930 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-14930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14930
https://sourceware.org/bugzilla/show_bug.cgi?id=22191
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a26a013f22a19e2c16729e64f40ef8a7dfcc086e
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-14932 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-14932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14932
https://sourceware.org/bugzilla/show_bug.cgi?id=22204
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e338894dc2e603683bed2172e8e9f25b29051005
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-14933 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/101203
https://access.redhat.com/security/cve/CVE-2017-14933
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22210
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=33e0a9a056bd23e923b929a4f2ab049ade0b1c32
| +| binutils | CVE-2017-14934 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/101204
https://access.redhat.com/security/cve/CVE-2017-14934
https://sourceware.org/bugzilla/show_bug.cgi?id=22219
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=19485196044b2521af979f1e5c4a89bfb90fba0b
| +| binutils | CVE-2017-14938 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/101212
https://access.redhat.com/security/cve/CVE-2017-14938
https://blogs.gentoo.org/ago/2017/09/26/binutils-memory-allocation-failure-in-_bfd_elf_slurp_version_tables-elf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14938
https://sourceware.org/bugzilla/show_bug.cgi?id=22166
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bd61e135492ecf624880e6b78e5fcde3c9716df6
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-14939 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/101216
https://access.redhat.com/security/cve/CVE-2017-14939
https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-read_1_byte-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14939
https://sourceware.org/bugzilla/show_bug.cgi?id=22169
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=515f23e63c0074ab531bc954f84ca40c6281a724
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42970/
| +| binutils | CVE-2017-14940 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-14940
https://blogs.gentoo.org/ago/2017/09/26/binutils-null-pointer-dereference-in-scan_unit_for_symbols-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14940
https://sourceware.org/bugzilla/show_bug.cgi?id=22166
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0d76029f92182c3682d8be2c833d45bc9a2068fe
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-14974 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-14974
https://sourceware.org/bugzilla/show_bug.cgi?id=22163
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e70c19e3a4c26e9c1ebf0c9170d105039b56d7cf
| +| binutils | CVE-2017-15020 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-15020
https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15020
https://sourceware.org/bugzilla/show_bug.cgi?id=22202
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1da5c9a485f3dcac4c45e96ef4b7dae5948314b5
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-15021 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-15021
https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-bfd_getl32-opncls-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15021
https://sourceware.org/bugzilla/show_bug.cgi?id=22197
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52b36c51e5bf6d7600fdc6ba115b170b0e78e31d
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-15022 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-15022
https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15022
https://sourceware.org/bugzilla/show_bug.cgi?id=22201
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11855d8a1f11b102a702ab76e95b22082cccf2f8
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-15023 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/101611
https://access.redhat.com/security/cve/CVE-2017-15023
https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22200
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf
| +| binutils | CVE-2017-15024 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-15024
https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15024
https://sourceware.org/bugzilla/show_bug.cgi?id=22187
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52a93b95ec0771c97e26f0bb28630a271a667bd2
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-15025 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-15025
https://blogs.gentoo.org/ago/2017/10/03/binutils-divide-by-zero-in-decode_line_info-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15025
https://sourceware.org/bugzilla/show_bug.cgi?id=22186
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d8010d3e75ec7194a4703774090b27486b742d48
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-15225 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-15225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15225
https://sourceware.org/bugzilla/show_bug.cgi?id=22212
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b55ec8b676ed05d93ee49d6c79ae0403616c4fb0
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-15938 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/101610
https://access.redhat.com/security/cve/CVE-2017-15938
https://blogs.gentoo.org/ago/2017/10/24/binutils-invalid-memory-read-in-find_abstract_instance_name-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15938
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22209
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1b86808a86077722ee4f42ff97f836b12420bb2a
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-15939 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/101613
https://access.redhat.com/security/cve/CVE-2017-15939
https://blogs.gentoo.org/ago/2017/10/24/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c-incomplete-fix-for-cve-2017-15023/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15939
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22205
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a54018b72d75abf2e74bf36016702da06399c1d9
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-15996 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/101608
https://access.redhat.com/security/cve/CVE-2017-15996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15996
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22361
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d91f0b20e561e326ee91a09a76206257bde8438b
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-16826 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16826
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22376
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a67d66eb97e7613a38ffe6622d837303b3ecd31d
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-16827 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16827
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22306
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0301ce1486b1450f219202677f30d0fa97335419
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-16828 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16828
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22386
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-16829 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16829
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22307
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163
| +| binutils | CVE-2017-16830 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/101941
https://access.redhat.com/security/cve/CVE-2017-16830
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22384
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4
| +| binutils | CVE-2017-16831 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16831
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22385
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-16832 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16832
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22373
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0bb6961f18b8e832d88b490d421ca56cea16c45b
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-17080 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17080
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22421
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-17121 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17121
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22506
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b23dc97fe237a1d9e850d7cbeee066183a00630b
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-17122 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22508
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d785b7d4b877ed465d04072e17ca19d0f47d840f
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils | CVE-2017-17123 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17123
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22509
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4581a1c7d304ce14e714b27522ebf3d0188d6543
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-17124 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17124
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22507
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b0029dce6867de1a2828293177b0e030d2f0f03c
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-17125 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17125
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22443
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=160b1a618ad94988410dc81fce9189fcda5b7ff4
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-17126 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17126
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22510
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f425ec6600b69e39eb605f3128806ff688137ea8
| +| binutils | CVE-2017-6969 | LOW | 2.27-41.base.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2017/03/16/8
http://www.securityfocus.com/bid/97065
https://access.redhat.com/security/cve/CVE-2017-6969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21156
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-7209 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/96994
https://access.redhat.com/security/cve/CVE-2017-7209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21135
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-7210 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/96992
https://access.redhat.com/security/cve/CVE-2017-7210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21157
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-7223 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-7223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7223
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20898
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-7224 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/97277
https://access.redhat.com/security/cve/CVE-2017-7224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7224
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20892
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-7225 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/97275
https://access.redhat.com/security/cve/CVE-2017-7225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7225
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20891
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-7226 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-7226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7226
https://sourceware.org/bugzilla/show_bug.cgi?id=20905
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-7227 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/97209
https://access.redhat.com/security/cve/CVE-2017-7227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7227
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20906
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-7299 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/97217
https://access.redhat.com/security/cve/CVE-2017-7299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7299
https://sourceware.org/bugzilla/show_bug.cgi?id=20908
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-7300 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/97219
https://access.redhat.com/security/cve/CVE-2017-7300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7300
https://sourceware.org/bugzilla/show_bug.cgi?id=20909
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-7301 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/97218
https://access.redhat.com/security/cve/CVE-2017-7301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7301
https://sourceware.org/bugzilla/show_bug.cgi?id=20924
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-7302 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/97216
https://access.redhat.com/security/cve/CVE-2017-7302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7302
https://sourceware.org/bugzilla/show_bug.cgi?id=20921
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-7303 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/97213
https://access.redhat.com/security/cve/CVE-2017-7303
https://sourceware.org/bugzilla/show_bug.cgi?id=20922
| +| binutils | CVE-2017-7304 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/97215
https://access.redhat.com/security/cve/CVE-2017-7304
https://sourceware.org/bugzilla/show_bug.cgi?id=20931
| +| binutils | CVE-2017-7614 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-7614
https://blogs.gentoo.org/ago/2017/04/05/binutils-two-null-pointer-dereference-in-elflink-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7614
https://security.gentoo.org/glsa/201709-02
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-8392 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-8392
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21409
| +| binutils | CVE-2017-8393 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-8393
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8393
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21412
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-8394 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-8394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8394
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21414
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-8395 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-8395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8395
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21431
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-8396 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-8396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8396
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21432
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-8397 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-8397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8397
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21434
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-8398 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-8398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8398
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21438
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-8421 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-8421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8421
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21440
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9038 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/98589
https://access.redhat.com/security/cve/CVE-2017-9038
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f32ba72991d2406b21ab17edc234a2f3fa7fb23d
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9039 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/98580
https://access.redhat.com/security/cve/CVE-2017-9039
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=82156ab704b08b124d319c0decdbd48b3ca2dac5
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9040 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/98579
https://access.redhat.com/security/cve/CVE-2017-9040
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9041 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/98598
https://access.redhat.com/security/cve/CVE-2017-9041
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9041
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75ec1fdbb797a389e4fe4aaf2e15358a070dcc19
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c4ab9505b53cdc899506ed421fddb7e1f8faf7a3
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9042 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-9042
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9043 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/98591
https://access.redhat.com/security/cve/CVE-2017-9043
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ddef72cdc10d82ba011a7ff81cafbbd3466acf54
| +| binutils | CVE-2017-9044 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/98587
https://access.redhat.com/security/cve/CVE-2017-9044
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9044
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9742 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99105
https://access.redhat.com/security/cve/CVE-2017-9742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9742
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21576
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42203/
| +| binutils | CVE-2017-9743 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99106
https://access.redhat.com/security/cve/CVE-2017-9743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9743
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21577
| +| binutils | CVE-2017-9744 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99108
https://access.redhat.com/security/cve/CVE-2017-9744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9744
https://sourceware.org/bugzilla/show_bug.cgi?id=21578
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9745 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99109
https://access.redhat.com/security/cve/CVE-2017-9745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9745
https://sourceware.org/bugzilla/show_bug.cgi?id=21579
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9746 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99117
https://access.redhat.com/security/cve/CVE-2017-9746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9746
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21580
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42199/
| +| binutils | CVE-2017-9747 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99114
https://access.redhat.com/security/cve/CVE-2017-9747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9747
https://sourceware.org/bugzilla/show_bug.cgi?id=21581
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42200/
| +| binutils | CVE-2017-9748 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99110
https://access.redhat.com/security/cve/CVE-2017-9748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9748
https://sourceware.org/bugzilla/show_bug.cgi?id=21582
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42202/
| +| binutils | CVE-2017-9749 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99113
https://access.redhat.com/security/cve/CVE-2017-9749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9749
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21586
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42201/
| +| binutils | CVE-2017-9750 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99118
https://access.redhat.com/security/cve/CVE-2017-9750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9750
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21587
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42198/
| +| binutils | CVE-2017-9751 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99111
https://access.redhat.com/security/cve/CVE-2017-9751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9751
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21588
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9752 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99122
https://access.redhat.com/security/cve/CVE-2017-9752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9752
https://sourceware.org/bugzilla/show_bug.cgi?id=21589
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9753 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99116
https://access.redhat.com/security/cve/CVE-2017-9753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9753
https://sourceware.org/bugzilla/show_bug.cgi?id=21591
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9754 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99125
https://access.redhat.com/security/cve/CVE-2017-9754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9754
https://sourceware.org/bugzilla/show_bug.cgi?id=21591
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9755 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99124
https://access.redhat.com/security/cve/CVE-2017-9755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9755
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21594
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9756 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99103
https://access.redhat.com/security/cve/CVE-2017-9756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9756
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21595
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42204/
| +| binutils | CVE-2017-9954 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99307
https://access.redhat.com/security/cve/CVE-2017-9954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9954
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21670
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2017-9955 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/99573
https://access.redhat.com/security/cve/CVE-2017-9955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9955
https://sourceware.org/bugzilla/show_bug.cgi?id=21665
| +| binutils | CVE-2018-12698 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/104539
https://access.redhat.com/security/cve/CVE-2018-12698
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-12699 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/104540
https://access.redhat.com/security/cve/CVE-2018-12699
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-12934 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12934
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-17360 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/security/cve/CVE-2018-17360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
https://sourceware.org/bugzilla/show_bug.cgi?id=23685
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-17794 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-17794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-17985 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/security/cve/CVE-2018-17985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18483 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://access.redhat.com/security/cve/CVE-2018-18483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18484 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105693
https://access.redhat.com/security/cve/CVE-2018-18484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18605 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://access.redhat.com/security/cve/CVE-2018-18605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23804
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18606 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://access.redhat.com/security/cve/CVE-2018-18606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23806
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18607 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://access.redhat.com/security/cve/CVE-2018-18607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23805
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18700 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-18700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18701 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-18701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-19932 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://access.redhat.com/security/cve/CVE-2018-19932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23932
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20002 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/106142
https://access.redhat.com/security/cve/CVE-2018-20002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23952
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
https://support.f5.com/csp/article/K62602089
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20657 | LOW | 2.27-41.base.el7 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| binutils | CVE-2018-6323 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/102821
https://access.redhat.com/security/cve/CVE-2018-6323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6323
https://sourceware.org/bugzilla/show_bug.cgi?id=22746
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/44035/
| +| binutils | CVE-2018-6759 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/103030
https://access.redhat.com/security/cve/CVE-2018-6759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6759
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22794
https://ubuntu.com/security/notices/USN-4336-2
| +| binutils | CVE-2018-6872 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/103103
https://access.redhat.com/security/cve/CVE-2018-6872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22788
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h=ef135d4314fd4c2d7da66b9d7b59af4a85b0f7e6
| +| binutils | CVE-2019-1010204 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-5349-1
| +| binutils | CVE-2019-12972 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/108903
https://access.redhat.com/security/cve/CVE-2019-12972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
https://nvd.nist.gov/vuln/detail/CVE-2019-12972
https://security.gentoo.org/glsa/202007-39
https://sourceware.org/bugzilla/show_bug.cgi?id=24689
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-14250 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-17450 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-17450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
https://linux.oracle.com/cve/CVE-2019-17450.html
https://linux.oracle.com/errata/ELSA-2020-4465.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17450
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25078
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-17451 | LOW | 2.27-41.base.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-17451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
https://linux.oracle.com/cve/CVE-2019-17451.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17451
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25070
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2020-16591 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-16591
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25822
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
| +| binutils | CVE-2020-16593 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-16593
https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25827
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
| +| binutils | CVE-2020-16599 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-16599
https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25842
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
| +| binutils | CVE-2020-35448 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35448
https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils | CVE-2020-35493 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35493
https://bugzilla.redhat.com/show_bug.cgi?id=1911437
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35493
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2020-35494 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35494
https://bugzilla.redhat.com/show_bug.cgi?id=1911439
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35494
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2020-35495 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35495
https://bugzilla.redhat.com/show_bug.cgi?id=1911441
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35495
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2020-35496 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35496
https://bugzilla.redhat.com/show_bug.cgi?id=1911444
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35496
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2020-35507 | LOW | 2.27-41.base.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35507
https://bugzilla.redhat.com/show_bug.cgi?id=1911691
https://nvd.nist.gov/vuln/detail/CVE-2020-35507
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| bzip2-libs | CVE-2016-3189 | LOW | 1.0.6-13.el7 | |
Expand...http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
http://www.openwall.com/lists/oss-security/2016/06/20/1
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91297
http://www.securitytracker.com/id/1036132
https://access.redhat.com/security/cve/CVE-2016-3189
https://bugzilla.redhat.com/show_bug.cgi?id=1319648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189
https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e@%3Cjira.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
https://marc.info/?l=oss-security&m=146642106322396&w=2
https://nvd.nist.gov/vuln/detail/CVE-2016-3189
https://seclists.org/bugtraq/2019/Aug/4
https://seclists.org/bugtraq/2019/Jul/22
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
https://security.gentoo.org/glsa/201708-08
https://ubuntu.com/security/notices/USN-4038-1
https://ubuntu.com/security/notices/USN-4038-2
https://usn.ubuntu.com/4038-1/
https://usn.ubuntu.com/4038-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| bzip2-libs | CVE-2019-12900 | LOW | 1.0.6-13.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
https://access.redhat.com/security/cve/CVE-2019-12900
https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2019-12900
https://seclists.org/bugtraq/2019/Aug/4
https://seclists.org/bugtraq/2019/Jul/22
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4038-1
https://ubuntu.com/security/notices/USN-4038-2
https://ubuntu.com/security/notices/USN-4038-3
https://ubuntu.com/security/notices/USN-4038-4
https://ubuntu.com/security/notices/USN-4146-1
https://ubuntu.com/security/notices/USN-4146-2
https://usn.ubuntu.com/4038-1/
https://usn.ubuntu.com/4038-2/
https://usn.ubuntu.com/4146-1/
https://usn.ubuntu.com/4146-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| coreutils | CVE-2016-2781 | MEDIUM | 8.22-24.el7 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | MEDIUM | 8.22-24.el7 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| coreutils | CVE-2014-9471 | LOW | 8.22-24.el7 | |
Expand...http://advisories.mageia.org/MGASA-2015-0029.html
http://debbugs.gnu.org/cgi/bugreport.cgi?bug=16872
http://debbugs.gnu.org/cgi/bugreport.cgi?msg=11;filename=date-tz-crash.patch;att=1;bug=16872
http://debbugs.gnu.org/cgi/bugreport.cgi?msg=19;filename=coreutils-date-crash.patch;att=1;bug=16872
http://secunia.com/advisories/62226
http://ubuntu.com/usn/usn-2473-1
http://www.mandriva.com/security/advisories?name=MDVSA-2015:179
http://www.openwall.com/lists/oss-security/2014/11/25/1
http://www.openwall.com/lists/oss-security/2014/11/25/4
http://www.openwall.com/lists/oss-security/2015/01/03/11
https://access.redhat.com/security/cve/CVE-2014-9471
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9471
https://security.gentoo.org/glsa/201612-22
https://ubuntu.com/security/notices/USN-2473-1
| +| coreutils | CVE-2015-4041 | LOW | 8.22-24.el7 | |
Expand...http://openwall.com/lists/oss-security/2015/05/15/1
https://access.redhat.com/security/cve/CVE-2015-4041
https://bugzilla.suse.com/show_bug.cgi?id=928749
https://github.com/pixelb/coreutils/commit/bea5e36cc876ed627bb5e0eca36fdfaa6465e940
| +| coreutils | CVE-2015-4042 | LOW | 8.22-24.el7 | |
Expand...http://openwall.com/lists/oss-security/2015/05/15/1
https://access.redhat.com/security/cve/CVE-2015-4042
https://github.com/pixelb/coreutils/commit/bea5e36cc876ed627bb5e0eca36fdfaa6465e940
| +| cpio | CVE-2019-14866 | MEDIUM | 2.11-27.el7 | 2.11-28.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-14866
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866
https://linux.oracle.com/cve/CVE-2019-14866.html
https://linux.oracle.com/errata/ELSA-2021-1582.html
https://lists.gnu.org/archive/html/bug-cpio/2019-08/msg00003.html
https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html
https://ubuntu.com/security/notices/USN-4176-1
| +| cpio | CVE-2021-38185 | MEDIUM | 2.11-27.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-38185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185
https://errata.almalinux.org/8/ALSA-2022-1991.html
https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b
https://github.com/fangqyi/cpiopwn
https://linux.oracle.com/cve/CVE-2021-38185.html
https://linux.oracle.com/errata/ELSA-2022-1991.html
https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html
https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html
https://nvd.nist.gov/vuln/detail/CVE-2021-38185
https://ubuntu.com/security/notices/USN-5064-1
https://ubuntu.com/security/notices/USN-5064-2
| +| cpio | CVE-2015-1197 | LOW | 2.11-27.el7 | |
Expand...http://advisories.mageia.org/MGASA-2015-0080.html
http://www.mandriva.com/security/advisories?name=MDVSA-2015:066
http://www.openwall.com/lists/oss-security/2015/01/07/5
http://www.openwall.com/lists/oss-security/2015/01/18/7
http://www.securityfocus.com/bid/71914
http://www.ubuntu.com/usn/USN-2906-1
https://access.redhat.com/security/cve/CVE-2015-1197
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1197
https://lists.gnu.org/archive/html/bug-cpio/2015-01/msg00000.html
https://ubuntu.com/security/notices/USN-2906-1
| +| cpio | CVE-2016-2037 | LOW | 2.11-27.el7 | |
Expand...http://www.debian.org/security/2016/dsa-3483
http://www.openwall.com/lists/oss-security/2016/01/19/4
http://www.openwall.com/lists/oss-security/2016/01/22/4
http://www.securityfocus.com/bid/82293
http://www.securitytracker.com/id/1035067
http://www.ubuntu.com/usn/USN-2906-1
https://access.redhat.com/security/cve/CVE-2016-2037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037
https://ubuntu.com/security/notices/USN-2906-1
| +| cpp | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
| +| cpp | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| cpp | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
| +| cpp | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| cpp | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
| +| cpp | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
| +| cpp | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| cpp | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| cpp | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
| +| cpp | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
| +| cpp | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
| +| cpp | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
| +| cpp | CVE-2015-5276 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
| +| cpp | CVE-2016-2226 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
| +| cpp | CVE-2016-4487 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| cpp | CVE-2016-4488 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| cpp | CVE-2016-4489 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| cpp | CVE-2016-4490 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| cpp | CVE-2016-4491 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| cpp | CVE-2016-4492 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| cpp | CVE-2016-4493 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| cpp | CVE-2018-20657 | LOW | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| cpp | CVE-2019-14250 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| cpp | CVE-2021-46195 | LOW | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| cracklib | CVE-2016-6318 | LOW | 2.9.0-11.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html
http://seclists.org/oss-sec/2016/q3/290
http://www.openwall.com/lists/oss-security/2016/08/16/2
http://www.securityfocus.com/bid/92478
https://access.redhat.com/security/cve/CVE-2016-6318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/05/msg00023.html
https://security.gentoo.org/glsa/201612-25
| +| cracklib-dicts | CVE-2016-6318 | LOW | 2.9.0-11.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html
http://seclists.org/oss-sec/2016/q3/290
http://www.openwall.com/lists/oss-security/2016/08/16/2
http://www.securityfocus.com/bid/92478
https://access.redhat.com/security/cve/CVE-2016-6318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/05/msg00023.html
https://security.gentoo.org/glsa/201612-25
| +| curl | CVE-2015-3153 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://curl.haxx.se/docs/adv_20150429.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html
http://www.debian.org/security/2015/dsa-3240
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
http://www.securityfocus.com/bid/74408
http://www.securitytracker.com/id/1032233
http://www.ubuntu.com/usn/USN-2591-1
https://access.redhat.com/security/cve/CVE-2015-3153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153
https://kc.mcafee.com/corporate/index?page=content&id=SB10131
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2591-1
| +| curl | CVE-2016-8615 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94096
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8615
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615
https://curl.haxx.se/CVE-2016-8615.patch
https://curl.haxx.se/docs/adv_20161102A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
https://linux.oracle.com/cve/CVE-2016-8615.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| curl | CVE-2016-8617 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94097
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8617
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617
https://curl.haxx.se/CVE-2016-8617.patch
https://curl.haxx.se/docs/adv_20161102C.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
https://linux.oracle.com/cve/CVE-2016-8617.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| curl | CVE-2016-8618 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94098
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8618
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618
https://curl.haxx.se/docs/adv_20161102D.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
https://linux.oracle.com/cve/CVE-2016-8618.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| curl | CVE-2016-8619 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94100
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8619
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619
https://curl.haxx.se/CVE-2016-8619.patch
https://curl.haxx.se/docs/adv_20161102E.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
https://linux.oracle.com/cve/CVE-2016-8619.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| curl | CVE-2016-8624 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94103
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8624
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624
https://curl.haxx.se/docs/adv_20161102J.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
https://linux.oracle.com/cve/CVE-2016-8624.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| curl | CVE-2016-8625 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.securityfocus.com/bid/94107
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8625
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625
https://curl.haxx.se/CVE-2016-8625.patch
https://curl.haxx.se/docs/adv_20161102K.html
https://linux.oracle.com/cve/CVE-2016-8625.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://www.tenable.com/security/tns-2016-21
| +| curl | CVE-2017-1000254 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/101115
http://www.securitytracker.com/id/1039509
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000254
https://curl.haxx.se/673d0cd8.patch
https://curl.haxx.se/docs/adv_20171004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201712-04
https://support.apple.com/HT208331
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
| +| curl | CVE-2017-8817 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=162
http://www.securityfocus.com/bid/102057
http://www.securitytracker.com/id/1039897
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-8817
https://curl.haxx.se/docs/adv_2017-ae72.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
https://security.gentoo.org/glsa/201712-04
https://ubuntu.com/security/notices/USN-3498-1
https://ubuntu.com/security/notices/USN-3498-2
https://www.debian.org/security/2017/dsa-4051
| +| curl | CVE-2019-5482 | MEDIUM | 7.29.0-54.el7 | 7.29.0-59.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html
https://access.redhat.com/security/cve/CVE-2019-5482
https://curl.haxx.se/docs/CVE-2019-5482.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
https://linux.oracle.com/cve/CVE-2019-5482.html
https://linux.oracle.com/errata/ELSA-2020-5562.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/
https://seclists.org/bugtraq/2020/Feb/36
https://security.gentoo.org/glsa/202003-29
https://security.netapp.com/advisory/ntap-20191004-0003/
https://security.netapp.com/advisory/ntap-20200416-0003/
https://ubuntu.com/security/notices/USN-4129-1
https://ubuntu.com/security/notices/USN-4129-2
https://www.debian.org/security/2020/dsa-4633
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| curl | CVE-2020-8177 | MEDIUM | 7.29.0-54.el7 | 7.29.0-59.el7_9.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-8177
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.haxx.se/docs/CVE-2020-8177.html
https://curl.se/docs/CVE-2020-8177.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
https://hackerone.com/reports/887462
https://linux.oracle.com/cve/CVE-2020-8177.html
https://linux.oracle.com/errata/ELSA-2020-5002.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8177
https://ubuntu.com/security/notices/USN-4402-1
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2020-8284 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-8284
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2020-8284.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
https://hackerone.com/reports/1040166
https://linux.oracle.com/cve/CVE-2020-8284.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://nvd.nist.gov/vuln/detail/CVE-2020-8284
https://security.gentoo.org/glsa/202012-14
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
https://ubuntu.com/security/notices/USN-4665-1
https://ubuntu.com/security/notices/USN-4665-2
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2020-8285 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://seclists.org/fulldisclosure/2021/Apr/51
https://access.redhat.com/security/cve/CVE-2020-8285
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2020-8285.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
https://github.com/curl/curl/issues/6255
https://hackerone.com/reports/1045844
https://linux.oracle.com/cve/CVE-2020-8285.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://nvd.nist.gov/vuln/detail/CVE-2020-8285
https://security.gentoo.org/glsa/202012-14
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
https://ubuntu.com/security/notices/USN-4665-1
https://ubuntu.com/security/notices/USN-4665-2
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22876 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22876
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22876.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1101882
https://linux.oracle.com/cve/CVE-2021-22876.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
https://security.gentoo.org/glsa/202105-36
https://security.netapp.com/advisory/ntap-20210521-0007/
https://ubuntu.com/security/notices/USN-4898-1
https://ubuntu.com/security/notices/USN-4903-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22924 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-27774 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27778 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27778
| +| curl | CVE-2022-27779 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27779
| +| curl | CVE-2022-27780 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27780
https://curl.se/docs/CVE-2022-27780.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27782 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-30115 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-30115
| +| curl | CVE-2016-0755 | LOW | 7.29.0-54.el7 | |
Expand...http://curl.haxx.se/docs/adv_20160127A.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
http://www.debian.org/security/2016/dsa-3455
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/82307
http://www.securitytracker.com/id/1034882
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
http://www.ubuntu.com/usn/USN-2882-1
https://access.redhat.com/security/cve/CVE-2016-0755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
https://security.gentoo.org/glsa/201701-47
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-2882-1
| +| curl | CVE-2016-8616 | LOW | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94094
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8616
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616
https://curl.haxx.se/CVE-2016-8616.patch
https://curl.haxx.se/docs/adv_20161102B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
https://linux.oracle.com/cve/CVE-2016-8616.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| curl | CVE-2016-8621 | LOW | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94101
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8621
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621
https://curl.haxx.se/CVE-2016-8621.patch
https://curl.haxx.se/docs/adv_20161102G.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
https://linux.oracle.com/cve/CVE-2016-8621.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| curl | CVE-2016-8622 | LOW | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94105
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8622
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622
https://curl.haxx.se/docs/adv_20161102H.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
https://linux.oracle.com/cve/CVE-2016-8622.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| curl | CVE-2016-8623 | LOW | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94106
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623
https://curl.haxx.se/CVE-2016-8623.patch
https://curl.haxx.se/docs/adv_20161102I.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
https://linux.oracle.com/cve/CVE-2016-8623.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| curl | CVE-2016-9586 | LOW | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/95019
http://www.securitytracker.com/id/1037515
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-9586
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
https://curl.haxx.se/docs/adv_20161221A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
| +| curl | CVE-2017-1000100 | LOW | 7.29.0-54.el7 | |
Expand...http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/100286
http://www.securitytracker.com/id/1039118
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000100
https://curl.haxx.se/docs/adv_20170809B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
https://security.gentoo.org/glsa/201709-14
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
| +| curl | CVE-2017-7407 | LOW | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-7407
https://curl.haxx.se/docs/adv_20170403.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
https://security.gentoo.org/glsa/201709-14
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
| +| curl | CVE-2018-20483 | LOW | 7.29.0-54.el7 | |
Expand...http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS
http://www.securityfocus.com/bid/106358
https://access.redhat.com/errata/RHSA-2019:3701
https://access.redhat.com/security/cve/CVE-2018-20483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483
https://linux.oracle.com/cve/CVE-2018-20483.html
https://linux.oracle.com/errata/ELSA-2019-3701.html
https://security.gentoo.org/glsa/201903-08
https://security.netapp.com/advisory/ntap-20190321-0002/
https://twitter.com/marcan42/status/1077676739877232640
https://ubuntu.com/security/notices/USN-3943-1
https://usn.ubuntu.com/3943-1/
| +| curl | CVE-2019-5436 | LOW | 7.29.0-54.el7 | 7.29.0-57.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html
http://www.openwall.com/lists/oss-security/2019/09/11/6
https://access.redhat.com/security/cve/CVE-2019-5436
https://curl.haxx.se/docs/CVE-2019-5436.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436
https://linux.oracle.com/cve/CVE-2019-5436.html
https://linux.oracle.com/errata/ELSA-2020-1792.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/
https://seclists.org/bugtraq/2020/Feb/36
https://security.gentoo.org/glsa/202003-29
https://security.netapp.com/advisory/ntap-20190606-0004/
https://support.f5.com/csp/article/K55133295
https://support.f5.com/csp/article/K55133295?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3993-1
https://ubuntu.com/security/notices/USN-3993-2
https://www.debian.org/security/2020/dsa-4633
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| curl | CVE-2020-8231 | LOW | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-8231
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.haxx.se/docs/CVE-2020-8231.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
https://hackerone.com/reports/948876
https://linux.oracle.com/cve/CVE-2020-8231.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-8231
https://security.gentoo.org/glsa/202012-14
https://ubuntu.com/security/notices/USN-4466-1
https://ubuntu.com/security/notices/USN-4466-2
https://ubuntu.com/security/notices/USN-4665-1
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| curl | CVE-2021-22898 | LOW | 7.29.0-54.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22925 | LOW | 7.29.0-54.el7 | |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
https://access.redhat.com/security/cve/CVE-2021-22925
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22925
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-27781 | LOW | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| cyrus-sasl-lib | CVE-2022-24407 | HIGH | 2.1.26-23.el7 | 2.1.26-24.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4
https://access.redhat.com/security/cve/CVE-2022-24407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
https://linux.oracle.com/cve/CVE-2022-24407.html
https://linux.oracle.com/errata/ELSA-2022-9239.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
https://nvd.nist.gov/vuln/detail/CVE-2022-24407
https://ubuntu.com/security/notices/USN-5301-1
https://ubuntu.com/security/notices/USN-5301-2
https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
https://www.debian.org/security/2022/dsa-5087
| +| cyrus-sasl-lib | CVE-2019-19906 | MEDIUM | 2.1.26-23.el7 | |
Expand...http://seclists.org/fulldisclosure/2020/Jul/23
http://seclists.org/fulldisclosure/2020/Jul/24
http://www.openwall.com/lists/oss-security/2022/02/23/4
https://access.redhat.com/security/cve/CVE-2019-19906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19906
https://github.com/cyrusimap/cyrus-sasl/issues/587
https://linux.oracle.com/cve/CVE-2019-19906.html
https://linux.oracle.com/errata/ELSA-2020-4497.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/12/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MW6GZCLECGL2PBNHVNPJIX4RPVRVFR7R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OB4GSVOJ6ESHQNT5GSV63OX5D4KPSTGT/
https://nvd.nist.gov/vuln/detail/CVE-2019-19906
https://seclists.org/bugtraq/2019/Dec/42
https://support.apple.com/kb/HT211288
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4256-1
https://usn.ubuntu.com/4256-1/
https://www.debian.org/security/2019/dsa-4591
https://www.openldap.org/its/index.cgi/Incoming?id=9123
| +| dbus | CVE-2020-12049 | HIGH | 1:1.10.24-13.el7_6 | 1:1.10.24-14.el7_8 |
Expand...http://www.openwall.com/lists/oss-security/2020/06/04/3
https://access.redhat.com/security/cve/CVE-2020-12049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049
https://gitlab.freedesktop.org/dbus/dbus/-/issues/294
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.10.30
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.12.18
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.13.16
https://linux.oracle.com/cve/CVE-2020-12049.html
https://linux.oracle.com/errata/ELSA-2020-3014.html
https://security.gentoo.org/glsa/202007-46
https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak
https://ubuntu.com/security/notices/USN-4398-1
https://ubuntu.com/security/notices/USN-4398-2
https://usn.ubuntu.com/4398-1/
https://usn.ubuntu.com/4398-2/
| +| dbus | CVE-2014-3477 | MEDIUM | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0266.html
http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567
http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html
http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://seclists.org/oss-sec/2014/q2/509
http://secunia.com/advisories/59428
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.securityfocus.com/bid/67986
https://access.redhat.com/security/cve/CVE-2014-3477
https://bugs.freedesktop.org/show_bug.cgi?id=78979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477
https://ubuntu.com/security/notices/USN-2275-1
| +| dbus | CVE-2014-3532 | MEDIUM | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0294.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://openwall.com/lists/oss-security/2014/07/02/4
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://secunia.com/advisories/60236
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
https://access.redhat.com/security/cve/CVE-2014-3532
https://bugs.freedesktop.org/show_bug.cgi?id=80163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532
https://ubuntu.com/security/notices/USN-2275-1
| +| dbus | CVE-2014-3533 | MEDIUM | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0294.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://openwall.com/lists/oss-security/2014/07/02/4
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://secunia.com/advisories/60236
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
https://access.redhat.com/security/cve/CVE-2014-3533
https://bugs.freedesktop.org/show_bug.cgi?id=79694
https://bugs.freedesktop.org/show_bug.cgi?id=80469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533
https://ubuntu.com/security/notices/USN-2275-1
| +| dbus | CVE-2014-3635 | MEDIUM | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3635
https://bugs.freedesktop.org/show_bug.cgi?id=83622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
https://ubuntu.com/security/notices/USN-2352-1
| +| dbus | CVE-2019-12749 | MEDIUM | 1:1.10.24-13.el7_6 | 1:1.10.24-15.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html
http://www.openwall.com/lists/oss-security/2019/06/11/2
http://www.securityfocus.com/bid/108751
https://access.redhat.com/errata/RHSA-2019:1726
https://access.redhat.com/errata/RHSA-2019:2868
https://access.redhat.com/errata/RHSA-2019:2870
https://access.redhat.com/errata/RHSA-2019:3707
https://access.redhat.com/security/cve/CVE-2019-12749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749
https://linux.oracle.com/cve/CVE-2019-12749.html
https://linux.oracle.com/errata/ELSA-2020-4032.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
https://nvd.nist.gov/vuln/detail/CVE-2019-12749
https://seclists.org/bugtraq/2019/Jun/16
https://security.gentoo.org/glsa/201909-08
https://ubuntu.com/security/notices/USN-4015-1
https://ubuntu.com/security/notices/USN-4015-2
https://usn.ubuntu.com/4015-1/
https://usn.ubuntu.com/4015-2/
https://www.debian.org/security/2019/dsa-4462
https://www.openwall.com/lists/oss-security/2019/06/11/2
| +| dbus | CVE-2014-3636 | LOW | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3636
https://bugs.freedesktop.org/show_bug.cgi?id=82820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
https://ubuntu.com/security/notices/USN-2352-1
| +| dbus | CVE-2014-3637 | LOW | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.openwall.com/lists/oss-security/2019/06/24/13
http://www.openwall.com/lists/oss-security/2019/06/24/14
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3637
https://bugs.freedesktop.org/show_bug.cgi?id=80559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
https://ubuntu.com/security/notices/USN-2352-1
| +| dbus | CVE-2014-3638 | LOW | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://secunia.com/advisories/61431
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3638
https://bugs.freedesktop.org/show_bug.cgi?id=81053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
https://ubuntu.com/security/notices/USN-2352-1
| +| dbus | CVE-2014-3639 | LOW | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://secunia.com/advisories/61431
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3639
https://bugs.freedesktop.org/show_bug.cgi?id=80919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
https://ubuntu.com/security/notices/USN-2352-1
| +| dbus | CVE-2015-0245 | LOW | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2015-0071.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html
http://www.debian.org/security/2015/dsa-3161
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2015/02/09/6
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
https://access.redhat.com/security/cve/CVE-2015-0245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245
https://ubuntu.com/security/notices/USN-3116-1
| +| dbus | CVE-2020-35512 | LOW | 1:1.10.24-13.el7_6 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35512
https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
https://ubuntu.com/security/notices/USN-5244-1
https://ubuntu.com/security/notices/USN-5244-2
| +| dbus-libs | CVE-2020-12049 | HIGH | 1:1.10.24-13.el7_6 | 1:1.10.24-14.el7_8 |
Expand...http://www.openwall.com/lists/oss-security/2020/06/04/3
https://access.redhat.com/security/cve/CVE-2020-12049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049
https://gitlab.freedesktop.org/dbus/dbus/-/issues/294
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.10.30
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.12.18
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.13.16
https://linux.oracle.com/cve/CVE-2020-12049.html
https://linux.oracle.com/errata/ELSA-2020-3014.html
https://security.gentoo.org/glsa/202007-46
https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak
https://ubuntu.com/security/notices/USN-4398-1
https://ubuntu.com/security/notices/USN-4398-2
https://usn.ubuntu.com/4398-1/
https://usn.ubuntu.com/4398-2/
| +| dbus-libs | CVE-2014-3477 | MEDIUM | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0266.html
http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567
http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html
http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://seclists.org/oss-sec/2014/q2/509
http://secunia.com/advisories/59428
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.securityfocus.com/bid/67986
https://access.redhat.com/security/cve/CVE-2014-3477
https://bugs.freedesktop.org/show_bug.cgi?id=78979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477
https://ubuntu.com/security/notices/USN-2275-1
| +| dbus-libs | CVE-2014-3532 | MEDIUM | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0294.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://openwall.com/lists/oss-security/2014/07/02/4
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://secunia.com/advisories/60236
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
https://access.redhat.com/security/cve/CVE-2014-3532
https://bugs.freedesktop.org/show_bug.cgi?id=80163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532
https://ubuntu.com/security/notices/USN-2275-1
| +| dbus-libs | CVE-2014-3533 | MEDIUM | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0294.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://openwall.com/lists/oss-security/2014/07/02/4
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://secunia.com/advisories/60236
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
https://access.redhat.com/security/cve/CVE-2014-3533
https://bugs.freedesktop.org/show_bug.cgi?id=79694
https://bugs.freedesktop.org/show_bug.cgi?id=80469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533
https://ubuntu.com/security/notices/USN-2275-1
| +| dbus-libs | CVE-2014-3635 | MEDIUM | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3635
https://bugs.freedesktop.org/show_bug.cgi?id=83622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
https://ubuntu.com/security/notices/USN-2352-1
| +| dbus-libs | CVE-2019-12749 | MEDIUM | 1:1.10.24-13.el7_6 | 1:1.10.24-15.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html
http://www.openwall.com/lists/oss-security/2019/06/11/2
http://www.securityfocus.com/bid/108751
https://access.redhat.com/errata/RHSA-2019:1726
https://access.redhat.com/errata/RHSA-2019:2868
https://access.redhat.com/errata/RHSA-2019:2870
https://access.redhat.com/errata/RHSA-2019:3707
https://access.redhat.com/security/cve/CVE-2019-12749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749
https://linux.oracle.com/cve/CVE-2019-12749.html
https://linux.oracle.com/errata/ELSA-2020-4032.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
https://nvd.nist.gov/vuln/detail/CVE-2019-12749
https://seclists.org/bugtraq/2019/Jun/16
https://security.gentoo.org/glsa/201909-08
https://ubuntu.com/security/notices/USN-4015-1
https://ubuntu.com/security/notices/USN-4015-2
https://usn.ubuntu.com/4015-1/
https://usn.ubuntu.com/4015-2/
https://www.debian.org/security/2019/dsa-4462
https://www.openwall.com/lists/oss-security/2019/06/11/2
| +| dbus-libs | CVE-2014-3636 | LOW | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3636
https://bugs.freedesktop.org/show_bug.cgi?id=82820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
https://ubuntu.com/security/notices/USN-2352-1
| +| dbus-libs | CVE-2014-3637 | LOW | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.openwall.com/lists/oss-security/2019/06/24/13
http://www.openwall.com/lists/oss-security/2019/06/24/14
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3637
https://bugs.freedesktop.org/show_bug.cgi?id=80559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
https://ubuntu.com/security/notices/USN-2352-1
| +| dbus-libs | CVE-2014-3638 | LOW | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://secunia.com/advisories/61431
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3638
https://bugs.freedesktop.org/show_bug.cgi?id=81053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
https://ubuntu.com/security/notices/USN-2352-1
| +| dbus-libs | CVE-2014-3639 | LOW | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://secunia.com/advisories/61431
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3639
https://bugs.freedesktop.org/show_bug.cgi?id=80919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
https://ubuntu.com/security/notices/USN-2352-1
| +| dbus-libs | CVE-2015-0245 | LOW | 1:1.10.24-13.el7_6 | |
Expand...http://advisories.mageia.org/MGASA-2015-0071.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html
http://www.debian.org/security/2015/dsa-3161
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2015/02/09/6
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
https://access.redhat.com/security/cve/CVE-2015-0245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245
https://ubuntu.com/security/notices/USN-3116-1
| +| dbus-libs | CVE-2020-35512 | LOW | 1:1.10.24-13.el7_6 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35512
https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
https://ubuntu.com/security/notices/USN-5244-1
https://ubuntu.com/security/notices/USN-5244-2
| +| device-mapper | CVE-2020-8991 | LOW | 7:1.02.158-2.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-8991
https://sourceware.org/git/?p=lvm2.git;a=commit;h=bcf9556b8fcd16ad8997f80cc92785f295c66701
| +| device-mapper-libs | CVE-2020-8991 | LOW | 7:1.02.158-2.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-8991
https://sourceware.org/git/?p=lvm2.git;a=commit;h=bcf9556b8fcd16ad8997f80cc92785f295c66701
| +| dracut | CVE-2016-4484 | MEDIUM | 033-564.el7 | |
Expand...http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html
http://www.openwall.com/lists/oss-security/2016/11/14/13
http://www.openwall.com/lists/oss-security/2016/11/15/1
http://www.openwall.com/lists/oss-security/2016/11/15/4
http://www.openwall.com/lists/oss-security/2016/11/16/6
http://www.securityfocus.com/bid/94315
https://access.redhat.com/articles/2786581
https://access.redhat.com/security/cve/CVE-2016-4484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4484
https://gitlab.com/cryptsetup/cryptsetup/commit/ef8a7d82d8d3716ae9b58179590f7908981fa0cb
| +| elfutils-default-yama-scope | CVE-2016-10254 | LOW | 0.176-2.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2017/03/22/2
https://access.redhat.com/security/cve/CVE-2016-10254
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254
https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-default-yama-scope | CVE-2016-10255 | LOW | 0.176-2.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2017/03/22/1
https://access.redhat.com/security/cve/CVE-2016-10255
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
https://bugzilla.redhat.com/show_bug.cgi?id=1387584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255
https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-default-yama-scope | CVE-2017-7607 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98608
https://access.redhat.com/security/cve/CVE-2017-7607
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-default-yama-scope | CVE-2017-7608 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98609
https://access.redhat.com/security/cve/CVE-2017-7608
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-default-yama-scope | CVE-2017-7609 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7609
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-default-yama-scope | CVE-2017-7610 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7610
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-default-yama-scope | CVE-2017-7611 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7611
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-default-yama-scope | CVE-2017-7612 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7612
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-default-yama-scope | CVE-2017-7613 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7613
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libelf | CVE-2016-10254 | LOW | 0.176-2.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2017/03/22/2
https://access.redhat.com/security/cve/CVE-2016-10254
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254
https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libelf | CVE-2016-10255 | LOW | 0.176-2.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2017/03/22/1
https://access.redhat.com/security/cve/CVE-2016-10255
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
https://bugzilla.redhat.com/show_bug.cgi?id=1387584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255
https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libelf | CVE-2017-7607 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98608
https://access.redhat.com/security/cve/CVE-2017-7607
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libelf | CVE-2017-7608 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98609
https://access.redhat.com/security/cve/CVE-2017-7608
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libelf | CVE-2017-7609 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7609
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libelf | CVE-2017-7610 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7610
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libelf | CVE-2017-7611 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7611
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libelf | CVE-2017-7612 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7612
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libelf | CVE-2017-7613 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7613
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libs | CVE-2016-10254 | LOW | 0.176-2.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2017/03/22/2
https://access.redhat.com/security/cve/CVE-2016-10254
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254
https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libs | CVE-2016-10255 | LOW | 0.176-2.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2017/03/22/1
https://access.redhat.com/security/cve/CVE-2016-10255
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
https://bugzilla.redhat.com/show_bug.cgi?id=1387584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255
https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libs | CVE-2017-7607 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98608
https://access.redhat.com/security/cve/CVE-2017-7607
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libs | CVE-2017-7608 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98609
https://access.redhat.com/security/cve/CVE-2017-7608
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libs | CVE-2017-7609 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7609
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libs | CVE-2017-7610 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7610
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libs | CVE-2017-7611 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7611
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libs | CVE-2017-7612 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7612
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| elfutils-libs | CVE-2017-7613 | LOW | 0.176-2.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7613
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
| +| expat | CVE-2022-25235 | HIGH | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25235
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
https://github.com/libexpat/libexpat/pull/562
https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)
https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)
https://linux.oracle.com/cve/CVE-2022-25235.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25235
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| expat | CVE-2022-25236 | HIGH | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 |
Expand...http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html
http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25236
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
https://github.com/libexpat/libexpat/pull/561
https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)
https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)
https://github.com/libexpat/libexpat/pull/577
https://linux.oracle.com/cve/CVE-2022-25236.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25236
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| expat | CVE-2022-25315 | HIGH | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25315
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
https://github.com/libexpat/libexpat/pull/559
https://linux.oracle.com/cve/CVE-2022-25315.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25315
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| expat | CVE-2012-6702 | MEDIUM | 2.1.0-10.el7_3 | |
Expand...http://seclists.org/oss-sec/2016/q2/468
http://www.debian.org/security/2016/dsa-3597
http://www.openwall.com/lists/oss-security/2016/06/03/8
http://www.openwall.com/lists/oss-security/2016/06/04/1
http://www.securityfocus.com/bid/91483
http://www.ubuntu.com/usn/USN-3010-1
https://access.redhat.com/security/cve/CVE-2012-6702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702
https://security.gentoo.org/glsa/201701-21
https://source.android.com/security/bulletin/2016-11-01.html
https://ubuntu.com/security/notices/USN-3010-1
https://ubuntu.com/security/notices/USN-3013-1
https://www.tenable.com/security/tns-2016-20
| +| expat | CVE-2013-0340 | MEDIUM | 2.1.0-10.el7_3 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://access.redhat.com/security/cve/CVE-2013-0340
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-0340
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| +| expat | CVE-2015-2716 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-11.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html
http://rhn.redhat.com/errata/RHSA-2015-0988.html
http://rhn.redhat.com/errata/RHSA-2015-1012.html
http://www.debian.org/security/2015/dsa-3260
http://www.debian.org/security/2015/dsa-3264
http://www.mozilla.org/security/announce/2015/mfsa2015-54.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/74611
http://www.ubuntu.com/usn/USN-2602-1
http://www.ubuntu.com/usn/USN-2603-1
https://access.redhat.com/security/cve/CVE-2015-2716
https://bugzilla.mozilla.org/show_bug.cgi?id=1140537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
https://hg.mozilla.org/releases/mozilla-esr31/rev/2f3e78643f5c
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2015-2716.html
https://linux.oracle.com/errata/ELSA-2020-1011.html
https://security.gentoo.org/glsa/201605-06
https://ubuntu.com/security/notices/USN-2602-1
https://ubuntu.com/security/notices/USN-2603-1
https://www.mozilla.org/en-US/security/advisories/mfsa2015-54/
https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
https://www.tenable.com/security/tns-2016-20
| +| expat | CVE-2016-4472 | MEDIUM | 2.1.0-10.el7_3 | |
Expand...http://www.securityfocus.com/bid/91528
http://www.ubuntu.com/usn/USN-3013-1
https://access.redhat.com/security/cve/CVE-2016-4472
https://bugzilla.redhat.com/show_bug.cgi?id=1344251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://security.gentoo.org/glsa/201701-21
https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
https://ubuntu.com/security/notices/USN-3013-1
https://www.tenable.com/security/tns-2016-20
| +| expat | CVE-2016-5300 | MEDIUM | 2.1.0-10.el7_3 | |
Expand...http://seclists.org/oss-sec/2016/q2/468
http://www.debian.org/security/2016/dsa-3597
http://www.openwall.com/lists/oss-security/2016/06/04/4
http://www.openwall.com/lists/oss-security/2016/06/04/5
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91159
http://www.ubuntu.com/usn/USN-3010-1
https://access.redhat.com/security/cve/CVE-2016-5300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://source.android.com/security/bulletin/2016-11-01.html
https://ubuntu.com/security/notices/USN-3010-1
https://ubuntu.com/security/notices/USN-3013-1
https://www.tenable.com/security/tns-2016-20
| +| expat | CVE-2017-9233 | MEDIUM | 2.1.0-10.el7_3 | |
Expand...http://www.debian.org/security/2017/dsa-3898
http://www.openwall.com/lists/oss-security/2017/06/17/7
http://www.securityfocus.com/bid/99276
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-9233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233
https://github.com/libexpat/libexpat/blob/master/expat/Changes
https://libexpat.github.io/doc/cve-2017-9233/
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://support.apple.com/HT208112
https://support.apple.com/HT208113
https://support.apple.com/HT208115
https://support.apple.com/HT208144
https://support.f5.com/csp/article/K03244804
https://ubuntu.com/security/notices/USN-3356-1
https://ubuntu.com/security/notices/USN-3356-2
| +| expat | CVE-2018-20843 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-12.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00039.html
https://access.redhat.com/security/cve/CVE-2018-20843
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843
https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes
https://github.com/libexpat/libexpat/issues/186
https://github.com/libexpat/libexpat/pull/262
https://github.com/libexpat/libexpat/pull/262/commits/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6
https://linux.oracle.com/cve/CVE-2018-20843.html
https://linux.oracle.com/errata/ELSA-2020-4484.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00028.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CEJJSQSG3KSUQY4FPVHZ7ZTT7FORMFVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDAUGEB3TUP6NEKJDBUBZX7N5OAUOOOK/
https://nvd.nist.gov/vuln/detail/CVE-2018-20843
https://seclists.org/bugtraq/2019/Jun/39
https://security.gentoo.org/glsa/201911-08
https://security.netapp.com/advisory/ntap-20190703-0001/
https://support.f5.com/csp/article/K51011533
https://ubuntu.com/security/notices/USN-4040-1
https://ubuntu.com/security/notices/USN-4040-2
https://usn.ubuntu.com/4040-1/
https://usn.ubuntu.com/4040-2/
https://www.debian.org/security/2019/dsa-4472
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-11
| +| expat | CVE-2021-45960 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2021-45960
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea
https://linux.oracle.com/cve/CVE-2021-45960.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45960
https://security.netapp.com/advisory/ntap-20220121-0004/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| expat | CVE-2021-46143 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2021-46143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://linux.oracle.com/cve/CVE-2021-46143.html
https://linux.oracle.com/errata/ELSA-2022-9227.html
https://nvd.nist.gov/vuln/detail/CVE-2021-46143
https://security.netapp.com/advisory/ntap-20220121-0006/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| expat | CVE-2022-22822 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22822.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22822
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| expat | CVE-2022-22823 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22823.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22823
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| expat | CVE-2022-22824 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22824.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22824
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| expat | CVE-2022-22825 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22825.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22825
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| expat | CVE-2022-22826 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22826.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22826
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| expat | CVE-2022-22827 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22827.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22827
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| expat | CVE-2022-23852 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://linux.oracle.com/cve/CVE-2022-23852.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23852
https://security.netapp.com/advisory/ntap-20220217-0001/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-05
| +| expat | CVE-2022-25313 | MEDIUM | 2.1.0-10.el7_3 | |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25313
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
https://github.com/libexpat/libexpat/pull/558
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25313
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| expat | CVE-2016-9063 | LOW | 2.1.0-10.el7_3 | |
Expand...http://www.securityfocus.com/bid/94337
http://www.securitytracker.com/id/1037298
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2016-9063
https://bugzilla.mozilla.org/show_bug.cgi?id=1274777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063
https://ubuntu.com/security/notices/USN-3124-1
https://www.debian.org/security/2017/dsa-3898
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9063
https://www.mozilla.org/security/advisories/mfsa2016-89/
| +| expat | CVE-2019-15903 | LOW | 2.1.0-10.el7_3 | 2.1.0-12.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
http://seclists.org/fulldisclosure/2019/Dec/23
http://seclists.org/fulldisclosure/2019/Dec/26
http://seclists.org/fulldisclosure/2019/Dec/27
http://seclists.org/fulldisclosure/2019/Dec/30
https://access.redhat.com/errata/RHSA-2019:3210
https://access.redhat.com/errata/RHSA-2019:3237
https://access.redhat.com/errata/RHSA-2019:3756
https://access.redhat.com/security/cve/CVE-2019-15903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
https://github.com/libexpat/libexpat/issues/317
https://github.com/libexpat/libexpat/issues/342
https://github.com/libexpat/libexpat/pull/318
https://linux.oracle.com/cve/CVE-2019-15903.html
https://linux.oracle.com/errata/ELSA-2020-4484.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/
https://nvd.nist.gov/vuln/detail/CVE-2019-15903
https://seclists.org/bugtraq/2019/Dec/17
https://seclists.org/bugtraq/2019/Dec/21
https://seclists.org/bugtraq/2019/Dec/23
https://seclists.org/bugtraq/2019/Nov/1
https://seclists.org/bugtraq/2019/Nov/24
https://seclists.org/bugtraq/2019/Oct/29
https://seclists.org/bugtraq/2019/Sep/30
https://seclists.org/bugtraq/2019/Sep/37
https://security.gentoo.org/glsa/201911-08
https://security.netapp.com/advisory/ntap-20190926-0004/
https://support.apple.com/kb/HT210785
https://support.apple.com/kb/HT210788
https://support.apple.com/kb/HT210789
https://support.apple.com/kb/HT210790
https://support.apple.com/kb/HT210793
https://support.apple.com/kb/HT210794
https://support.apple.com/kb/HT210795
https://ubuntu.com/security/notices/USN-4132-1
https://ubuntu.com/security/notices/USN-4132-2
https://ubuntu.com/security/notices/USN-4165-1
https://ubuntu.com/security/notices/USN-4202-1
https://ubuntu.com/security/notices/USN-4335-1
https://usn.ubuntu.com/4132-1/
https://usn.ubuntu.com/4132-2/
https://usn.ubuntu.com/4165-1/
https://usn.ubuntu.com/4202-1/
https://usn.ubuntu.com/4335-1/
https://www.debian.org/security/2019/dsa-4530
https://www.debian.org/security/2019/dsa-4549
https://www.debian.org/security/2019/dsa-4571
https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-15903
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.tenable.com/security/tns-2021-11
| +| expat | CVE-2022-23990 | LOW | 2.1.0-10.el7_3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://linux.oracle.com/cve/CVE-2022-23990.html
https://linux.oracle.com/errata/ELSA-2022-9232.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
https://nvd.nist.gov/vuln/detail/CVE-2022-23990
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-05
| +| file | CVE-2014-9620 | LOW | 5.11-36.el7 | |
Expand...http://advisories.mageia.org/MGASA-2015-0040.html
http://mx.gw.com/pipermail/file/2014/001653.html
http://mx.gw.com/pipermail/file/2015/001660.html
http://rhn.redhat.com/errata/RHSA-2016-0760.html
http://www.debian.org/security/2015/dsa-3121
http://www.openwall.com/lists/oss-security/2015/01/17/9
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/71715
https://access.redhat.com/security/cve/CVE-2014-9620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620
https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4
https://linux.oracle.com/cve/CVE-2014-9620.html
https://linux.oracle.com/errata/ELSA-2016-0760.html
https://security.gentoo.org/glsa/201503-08
https://ubuntu.com/security/notices/USN-3686-1
https://usn.ubuntu.com/3686-1/
| +| file | CVE-2015-8865 | LOW | 5.11-36.el7 | |
Expand...http://bugs.gw.com/view.php?id=522
http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85802
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8865
https://bugs.php.net/bug.php?id=71527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
| +| file-libs | CVE-2014-9620 | LOW | 5.11-36.el7 | |
Expand...http://advisories.mageia.org/MGASA-2015-0040.html
http://mx.gw.com/pipermail/file/2014/001653.html
http://mx.gw.com/pipermail/file/2015/001660.html
http://rhn.redhat.com/errata/RHSA-2016-0760.html
http://www.debian.org/security/2015/dsa-3121
http://www.openwall.com/lists/oss-security/2015/01/17/9
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/71715
https://access.redhat.com/security/cve/CVE-2014-9620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620
https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4
https://linux.oracle.com/cve/CVE-2014-9620.html
https://linux.oracle.com/errata/ELSA-2016-0760.html
https://security.gentoo.org/glsa/201503-08
https://ubuntu.com/security/notices/USN-3686-1
https://usn.ubuntu.com/3686-1/
| +| file-libs | CVE-2015-8865 | LOW | 5.11-36.el7 | |
Expand...http://bugs.gw.com/view.php?id=522
http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85802
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8865
https://bugs.php.net/bug.php?id=71527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
| +| flex | CVE-2016-6354 | MEDIUM | 2.5.37-6.el7 | |
Expand...http://seclists.org/oss-sec/2016/q3/97
http://www.debian.org/security/2016/dsa-3653
http://www.openwall.com/lists/oss-security/2016/07/18/8
http://www.openwall.com/lists/oss-security/2016/07/26/12
https://access.redhat.com/security/cve/CVE-2016-6354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354
https://github.com/westes/flex/commit/a5cbe929ac3255d371e698f62dc256afe7006466
https://security.gentoo.org/glsa/201701-31
| +| flex | CVE-2019-6293 | LOW | 2.5.37-6.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-6293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6293
https://github.com/westes/flex/issues/414
https://nvd.nist.gov/vuln/detail/CVE-2019-6293
| +| freetype | CVE-2016-10244 | MEDIUM | 2.8-14.el7_9.1 | |
Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog?h=VER-2-7
http://www.debian.org/security/2017/dsa-3839
http://www.securityfocus.com/bid/97405
http://www.securitytracker.com/id/1038090
http://www.securitytracker.com/id/1038201
https://access.redhat.com/security/cve/CVE-2016-10244
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
https://security.gentoo.org/glsa/201706-14
https://source.android.com/security/bulletin/2017-04-01
https://ubuntu.com/security/notices/USN-3237-1
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| freetype | CVE-2017-8105 | MEDIUM | 2.8-14.el7_9.1 | |
Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
http://www.debian.org/security/2017/dsa-3839
http://www.securityfocus.com/bid/99093
https://access.redhat.com/security/cve/CVE-2017-8105
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
https://security.gentoo.org/glsa/201706-14
https://ubuntu.com/security/notices/USN-3282-1
https://ubuntu.com/security/notices/USN-3282-2
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
| +| freetype | CVE-2017-8287 | MEDIUM | 2.8-14.el7_9.1 | |
Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0
http://www.debian.org/security/2017/dsa-3839
http://www.securityfocus.com/bid/99091
https://access.redhat.com/security/cve/CVE-2017-8287
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
https://security.gentoo.org/glsa/201706-14
https://ubuntu.com/security/notices/USN-3282-1
https://ubuntu.com/security/notices/USN-3282-2
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
| +| freetype | CVE-2022-27404 | MEDIUM | 2.8-14.el7_9.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27404
| +| freetype | CVE-2022-27405 | MEDIUM | 2.8-14.el7_9.1 | |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27405
| +| freetype | CVE-2022-27406 | MEDIUM | 2.8-14.el7_9.1 | |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27406
| +| freetype | CVE-2014-9745 | LOW | 2.8-14.el7_9.1 | |
Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
http://lists.opensuse.org/opensuse-updates/2015-10/msg00017.html
http://savannah.nongnu.org/bugs/index.php?41590
http://www.debian.org/security/2015/dsa-3370
http://www.securityfocus.com/bid/76727
http://www.securitytracker.com/id/1033536
http://www.ubuntu.com/usn/USN-2739-1
https://access.redhat.com/security/cve/CVE-2014-9745
https://bugs.launchpad.net/ubuntu/+source/freetype/+bug/1492124
https://code.google.com/p/chromium/issues/detail?id=459050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
https://ubuntu.com/security/notices/USN-2739-1
| +| freetype | CVE-2014-9746 | LOW | 2.8-14.el7_9.1 | |
Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1
http://www.debian.org/security/2015/dsa-3370
http://www.openwall.com/lists/oss-security/2015/09/11/4
http://www.openwall.com/lists/oss-security/2015/09/25/4
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
https://access.redhat.com/security/cve/CVE-2014-9746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
https://savannah.nongnu.org/bugs/?41309
https://ubuntu.com/security/notices/USN-2739-1
| +| freetype | CVE-2014-9747 | LOW | 2.8-14.el7_9.1 | |
Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1
http://www.debian.org/security/2015/dsa-3370
http://www.openwall.com/lists/oss-security/2015/09/11/4
http://www.openwall.com/lists/oss-security/2015/09/25
http://www.openwall.com/lists/oss-security/2015/09/25/4
https://access.redhat.com/security/cve/CVE-2014-9747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
https://savannah.nongnu.org/bugs/?41309
https://ubuntu.com/security/notices/USN-2739-1
| +| freetype | CVE-2018-6942 | LOW | 2.8-14.el7_9.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00054.html
https://access.redhat.com/security/cve/CVE-2018-6942
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=29c759284e305ec428703c9a5831d0b1fc3497ef
https://ubuntu.com/security/notices/USN-3572-1
https://usn.ubuntu.com/3572-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| gcc | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
| +| gcc | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| gcc | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
| +| gcc | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| gcc | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
| +| gcc | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
| +| gcc | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| gcc | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| gcc | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
| +| gcc | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
| +| gcc | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
| +| gcc | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
| +| gcc | CVE-2015-5276 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
| +| gcc | CVE-2016-2226 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
| +| gcc | CVE-2016-4487 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc | CVE-2016-4488 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc | CVE-2016-4489 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc | CVE-2016-4490 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc | CVE-2016-4491 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc | CVE-2016-4492 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc | CVE-2016-4493 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc | CVE-2018-20657 | LOW | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| gcc | CVE-2019-14250 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| gcc | CVE-2021-46195 | LOW | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| gcc-c++ | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
| +| gcc-c++ | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| gcc-c++ | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
| +| gcc-c++ | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| gcc-c++ | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
| +| gcc-c++ | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
| +| gcc-c++ | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| gcc-c++ | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| gcc-c++ | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
| +| gcc-c++ | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
| +| gcc-c++ | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
| +| gcc-c++ | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
| +| gcc-c++ | CVE-2015-5276 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
| +| gcc-c++ | CVE-2016-2226 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
| +| gcc-c++ | CVE-2016-4487 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc-c++ | CVE-2016-4488 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc-c++ | CVE-2016-4489 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc-c++ | CVE-2016-4490 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc-c++ | CVE-2016-4491 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc-c++ | CVE-2016-4492 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc-c++ | CVE-2016-4493 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| gcc-c++ | CVE-2018-20657 | LOW | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| gcc-c++ | CVE-2019-14250 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| gcc-c++ | CVE-2021-46195 | LOW | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| git | CVE-2022-25648 | CRITICAL | 1.8.3.1-23.el7_8 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-25648
https://github.com/advisories/GHSA-69p6-wvmq-27gg
https://github.com/ruby-git/ruby-git/pull/569
https://github.com/ruby-git/ruby-git/releases/tag/v1.11.0
https://nvd.nist.gov/vuln/detail/CVE-2022-25648
https://snyk.io/vuln/SNYK-RUBY-GIT-2421270
| +| git | CVE-2017-14867 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...http://www.openwall.com/lists/oss-security/2017/09/26/9
http://www.securityfocus.com/bid/101060
http://www.securitytracker.com/id/1039431
https://access.redhat.com/security/cve/CVE-2017-14867
https://bugs.debian.org/876854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14867
https://lists.debian.org/debian-security-announce/2017/msg00246.html
https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/T/#u
https://ubuntu.com/security/notices/USN-3438-1
https://www.debian.org/security/2017/dsa-3984
| +| git | CVE-2018-1000021 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://access.redhat.com/security/cve/CVE-2018-1000021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| +| git | CVE-2019-1348 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/errata/RHSA-2020:0228
https://access.redhat.com/security/cve/CVE-2019-1348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348
https://github.com/git/git/security/advisories/GHSA-2pw3-gwg9-8pqr
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://linux.oracle.com/cve/CVE-2019-1348.html
https://linux.oracle.com/errata/ELSA-2019-4356.html
https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://security.gentoo.org/glsa/202003-42
https://support.apple.com/kb/HT210729
https://ubuntu.com/security/notices/USN-4220-1
| +| git | CVE-2019-1349 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/errata/RHSA-2020:0228
https://access.redhat.com/security/cve/CVE-2019-1349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349
https://github.com/git/git/security/advisories/GHSA-4qvh-qvv7-frc7
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://linux.oracle.com/cve/CVE-2019-1349.html
https://linux.oracle.com/errata/ELSA-2019-4356.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://ubuntu.com/security/notices/USN-4220-1
| +| git | CVE-2021-21300 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html
http://seclists.org/fulldisclosure/2021/Apr/60
http://www.openwall.com/lists/oss-security/2021/03/09/3
https://access.redhat.com/security/cve/CVE-2021-21300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300
https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks
https://git-scm.com/docs/gitattributes#_filter
https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592
https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/
https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/
https://security.gentoo.org/glsa/202104-01
https://support.apple.com/kb/HT212320
https://ubuntu.com/security/notices/USN-4761-1
| +| git | CVE-2021-40330 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-40330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330
https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473
https://github.com/git/git/compare/v2.30.0...v2.30.1
https://nvd.nist.gov/vuln/detail/CVE-2021-40330
https://ubuntu.com/security/notices/USN-5076-1
| +| git | CVE-2022-24765 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...http://seclists.org/fulldisclosure/2022/May/31
http://www.openwall.com/lists/oss-security/2022/04/12/7
https://access.redhat.com/security/cve/CVE-2022-24765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash
https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode
https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/
https://support.apple.com/kb/HT213261
https://ubuntu.com/security/notices/USN-5376-1
https://ubuntu.com/security/notices/USN-5376-2
https://ubuntu.com/security/notices/USN-5376-3
| +| git | CVE-2017-15298 | LOW | 1.8.3.1-23.el7_8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2017-15298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298
https://github.com/Katee/git-bomb
https://kate.io/blog/git-bomb/
https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2
https://ubuntu.com/security/notices/USN-3829-1
https://usn.ubuntu.com/3829-1/
| +| glib2 | CVE-2015-8385 | HIGH | 2.56.1-8.el7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/85572
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8385
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385
https://linux.oracle.com/cve/CVE-2015-8385.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
| +| glib2 | CVE-2016-3191 | HIGH | 2.56.1-8.el7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://vcs.pcre.org/pcre2?view=revision&revision=489
http://vcs.pcre.org/pcre?view=revision&revision=1631
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/84810
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-3191
https://bto.bluecoat.com/security-advisory/sa128
https://bugs.debian.org/815920
https://bugs.debian.org/815921
https://bugs.exim.org/show_bug.cgi?id=1791
https://bugzilla.redhat.com/show_bug.cgi?id=1311503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191
https://linux.oracle.com/cve/CVE-2016-3191.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://ubuntu.com/security/notices/USN-2943-1
https://www.tenable.com/security/tns-2016-18
| +| glib2 | CVE-2021-27219 | HIGH | 2.56.1-8.el7 | 2.56.1-9.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2021-27219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219
https://gitlab.gnome.org/GNOME/glib/-/issues/2319
https://linux.oracle.com/cve/CVE-2021-27219.html
https://linux.oracle.com/errata/ELSA-2021-9318.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
https://nvd.nist.gov/vuln/detail/CVE-2021-27219
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210319-0004/
https://ubuntu.com/security/notices/USN-4759-1
| +| glib2 | CVE-2015-2327 | MEDIUM | 2.56.1-8.el7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www.fortiguard.com/advisory/FG-VD-15-010/
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/74924
https://access.redhat.com/security/cve/CVE-2015-2327
https://bugs.exim.org/show_bug.cgi?id=1503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327
https://jira.mongodb.org/browse/SERVER-17252
https://ubuntu.com/security/notices/USN-2943-1
| +| glib2 | CVE-2015-2328 | MEDIUM | 2.56.1-8.el7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.fortiguard.com/advisory/FG-VD-15-014/
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/74924
https://access.redhat.com/security/cve/CVE-2015-2328
https://bugs.exim.org/show_bug.cgi?id=1515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328
https://jira.mongodb.org/browse/SERVER-17252
https://linux.oracle.com/cve/CVE-2015-2328.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://ubuntu.com/security/notices/USN-2943-1
| +| glib2 | CVE-2015-3217 | MEDIUM | 2.56.1-8.el7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre?view=revision&revision=1566
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/06/03/7
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/75018
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-3217
https://bugs.exim.org/show_bug.cgi?id=1638
https://bugzilla.redhat.com/show_bug.cgi?id=1228283
https://linux.oracle.com/cve/CVE-2015-3217.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
| +| glib2 | CVE-2015-5073 | MEDIUM | 2.56.1-8.el7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?revision=1609&view=markup
http://vcs.pcre.org/pcre?view=revision&revision=1571
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/06/26/1
http://www.openwall.com/lists/oss-security/2015/06/26/3
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/75430
http://www.securitytracker.com/id/1033154
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-5073
https://bugs.exim.org/show_bug.cgi?id=1651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073
https://linux.oracle.com/cve/CVE-2015-5073.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2694-1
https://ubuntu.com/security/notices/USN-2943-1
| +| glib2 | CVE-2015-8388 | MEDIUM | 2.56.1-8.el7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/85576
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8388
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388
https://linux.oracle.com/cve/CVE-2015-8388.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
| +| glib2 | CVE-2015-8391 | MEDIUM | 2.56.1-8.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/82990
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8391
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://linux.oracle.com/cve/CVE-2015-8391.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
| +| glib2 | CVE-2021-27218 | MEDIUM | 2.56.1-8.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944
https://linux.oracle.com/cve/CVE-2021-27218.html
https://linux.oracle.com/errata/ELSA-2021-3058.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
https://nvd.nist.gov/vuln/detail/CVE-2021-27218
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210319-0004/
https://ubuntu.com/security/notices/USN-4759-1
| +| glib2 | CVE-2021-3800 | MEDIUM | 2.56.1-8.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800
https://linux.oracle.com/cve/CVE-2021-3800.html
https://linux.oracle.com/errata/ELSA-2021-4385.html
https://ubuntu.com/security/notices/USN-5189-1
https://www.openwall.com/lists/oss-security/2017/06/23/8
| +| glib2 | CVE-2015-8386 | LOW | 2.56.1-8.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/82990
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8386
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://linux.oracle.com/cve/CVE-2015-8386.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
| +| glib2 | CVE-2017-11164 | LOW | 2.56.1-8.el7 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| glib2 | CVE-2017-7244 | LOW | 2.56.1-8.el7 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7244
https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244
https://security.gentoo.org/glsa/201710-25
| +| glib2 | CVE-2017-7245 | LOW | 2.56.1-8.el7 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| glib2 | CVE-2017-7246 | LOW | 2.56.1-8.el7 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| glib2 | CVE-2018-16428 | LOW | 2.56.1-8.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2020/02/14/3
http://www.securityfocus.com/bid/105210
https://access.redhat.com/security/cve/CVE-2018-16428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16428
https://gitlab.gnome.org/GNOME/glib/commit/fccef3cc822af74699cca84cd202719ae61ca3b9
https://gitlab.gnome.org/GNOME/glib/issues/1364
https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html
https://ubuntu.com/security/notices/USN-3767-1
https://ubuntu.com/security/notices/USN-3767-2
https://usn.ubuntu.com/3767-1/
https://usn.ubuntu.com/3767-2/
| +| glib2 | CVE-2018-16429 | LOW | 2.56.1-8.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-16429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16429
https://gitlab.gnome.org/GNOME/glib/commit/cec71705406f0b2790422f0c1aa0ff3b4b464b1b
https://gitlab.gnome.org/GNOME/glib/issues/1361
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html
https://ubuntu.com/security/notices/USN-3767-1
https://ubuntu.com/security/notices/USN-3767-2
https://usn.ubuntu.com/3767-1/
https://usn.ubuntu.com/3767-2/
| +| glib2 | CVE-2019-13012 | LOW | 2.56.1-8.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00022.html
https://access.redhat.com/security/cve/CVE-2019-13012
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931234#12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13012
https://gitlab.gnome.org/GNOME/glib/commit/5e4da714f00f6bfb2ccd6d73d61329c6f3a08429
https://gitlab.gnome.org/GNOME/glib/issues/1658
https://gitlab.gnome.org/GNOME/glib/merge_requests/450
https://linux.oracle.com/cve/CVE-2019-13012.html
https://linux.oracle.com/errata/ELSA-2021-1586.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2019-13012
https://security.netapp.com/advisory/ntap-20190806-0003/
https://ubuntu.com/security/notices/USN-4049-1
https://ubuntu.com/security/notices/USN-4049-2
https://ubuntu.com/security/notices/USN-4049-3
https://ubuntu.com/security/notices/USN-4049-4
https://usn.ubuntu.com/4049-1/
https://usn.ubuntu.com/4049-2/
| +| glib2 | CVE-2021-28153 | LOW | 2.56.1-8.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-28153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153
https://gitlab.gnome.org/GNOME/glib/-/issues/2325
https://linux.oracle.com/cve/CVE-2021-28153.html
https://linux.oracle.com/errata/ELSA-2021-4385.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-28153
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210416-0003/
https://ubuntu.com/security/notices/USN-4764-1
| +| glibc | CVE-2009-5155 | MEDIUM | 2.17-292.el7 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| +| glibc | CVE-2015-8983 | MEDIUM | 2.17-292.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
| +| glibc | CVE-2016-1234 | MEDIUM | 2.17-292.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
| +| glibc | CVE-2016-4429 | MEDIUM | 2.17-292.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
| +| glibc | CVE-2017-8804 | MEDIUM | 2.17-292.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
http://www.openwall.com/lists/oss-security/2017/05/05/2
http://www.securityfocus.com/bid/98339
https://access.redhat.com/security/cve/CVE-2017-8804
https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
https://seclists.org/oss-sec/2017/q2/228
https://sourceware.org/bugzilla/show_bug.cgi?id=21461
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
| +| glibc | CVE-2019-25013 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| glibc | CVE-2019-9169 | MEDIUM | 2.17-292.el7 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| glibc | CVE-2020-10029 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| glibc | CVE-2020-1752 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| glibc | CVE-2020-29573 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-29573
https://linux.oracle.com/cve/CVE-2020-29573.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26649
https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
| +| glibc | CVE-2021-35942 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| glibc | CVE-2021-3999 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| glibc | CVE-2022-23218 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| glibc | CVE-2022-23219 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| glibc | CVE-2014-4043 | LOW | 2.17-292.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
http://www.openwall.com/lists/oss-security/2014/06/13/2
http://www.securityfocus.com/bid/68006
https://access.redhat.com/security/cve/CVE-2014-4043
https://bugzilla.redhat.com/show_bug.cgi?id=1109263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=17048
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362
https://ubuntu.com/security/notices/USN-2306-1
| +| glibc | CVE-2015-8982 | LOW | 2.17-292.el7 | |
Expand...http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
| +| glibc | CVE-2015-8984 | LOW | 2.17-292.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
| +| glibc | CVE-2015-8985 | LOW | 2.17-292.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| +| glibc | CVE-2016-10228 | LOW | 2.17-292.el7 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| glibc | CVE-2017-15671 | LOW | 2.17-292.el7 | |
Expand...http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
| +| glibc | CVE-2019-19126 | LOW | 2.17-292.el7 | 2.17-317.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| glibc | CVE-2020-27618 | LOW | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| glibc | CVE-2021-33574 | LOW | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| glibc-common | CVE-2009-5155 | MEDIUM | 2.17-292.el7 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| +| glibc-common | CVE-2015-8983 | MEDIUM | 2.17-292.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
| +| glibc-common | CVE-2016-1234 | MEDIUM | 2.17-292.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
| +| glibc-common | CVE-2016-4429 | MEDIUM | 2.17-292.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
| +| glibc-common | CVE-2017-8804 | MEDIUM | 2.17-292.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
http://www.openwall.com/lists/oss-security/2017/05/05/2
http://www.securityfocus.com/bid/98339
https://access.redhat.com/security/cve/CVE-2017-8804
https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
https://seclists.org/oss-sec/2017/q2/228
https://sourceware.org/bugzilla/show_bug.cgi?id=21461
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
| +| glibc-common | CVE-2019-25013 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| glibc-common | CVE-2019-9169 | MEDIUM | 2.17-292.el7 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| glibc-common | CVE-2020-10029 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| glibc-common | CVE-2020-1752 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| glibc-common | CVE-2020-29573 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-29573
https://linux.oracle.com/cve/CVE-2020-29573.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26649
https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
| +| glibc-common | CVE-2021-35942 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| glibc-common | CVE-2021-3999 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| glibc-common | CVE-2022-23218 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| glibc-common | CVE-2022-23219 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| glibc-common | CVE-2014-4043 | LOW | 2.17-292.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
http://www.openwall.com/lists/oss-security/2014/06/13/2
http://www.securityfocus.com/bid/68006
https://access.redhat.com/security/cve/CVE-2014-4043
https://bugzilla.redhat.com/show_bug.cgi?id=1109263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=17048
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362
https://ubuntu.com/security/notices/USN-2306-1
| +| glibc-common | CVE-2015-8982 | LOW | 2.17-292.el7 | |
Expand...http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
| +| glibc-common | CVE-2015-8984 | LOW | 2.17-292.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
| +| glibc-common | CVE-2015-8985 | LOW | 2.17-292.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| +| glibc-common | CVE-2016-10228 | LOW | 2.17-292.el7 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| glibc-common | CVE-2017-15671 | LOW | 2.17-292.el7 | |
Expand...http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
| +| glibc-common | CVE-2019-19126 | LOW | 2.17-292.el7 | 2.17-317.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| glibc-common | CVE-2020-27618 | LOW | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| glibc-common | CVE-2021-33574 | LOW | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| glibc-devel | CVE-2009-5155 | MEDIUM | 2.17-292.el7 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| +| glibc-devel | CVE-2015-8983 | MEDIUM | 2.17-292.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
| +| glibc-devel | CVE-2016-1234 | MEDIUM | 2.17-292.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
| +| glibc-devel | CVE-2016-4429 | MEDIUM | 2.17-292.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
| +| glibc-devel | CVE-2017-8804 | MEDIUM | 2.17-292.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
http://www.openwall.com/lists/oss-security/2017/05/05/2
http://www.securityfocus.com/bid/98339
https://access.redhat.com/security/cve/CVE-2017-8804
https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
https://seclists.org/oss-sec/2017/q2/228
https://sourceware.org/bugzilla/show_bug.cgi?id=21461
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
| +| glibc-devel | CVE-2019-25013 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| glibc-devel | CVE-2019-9169 | MEDIUM | 2.17-292.el7 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| glibc-devel | CVE-2020-10029 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| glibc-devel | CVE-2020-1752 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| glibc-devel | CVE-2020-29573 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-29573
https://linux.oracle.com/cve/CVE-2020-29573.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26649
https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
| +| glibc-devel | CVE-2021-35942 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| glibc-devel | CVE-2021-3999 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| glibc-devel | CVE-2022-23218 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| glibc-devel | CVE-2022-23219 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| glibc-devel | CVE-2014-4043 | LOW | 2.17-292.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
http://www.openwall.com/lists/oss-security/2014/06/13/2
http://www.securityfocus.com/bid/68006
https://access.redhat.com/security/cve/CVE-2014-4043
https://bugzilla.redhat.com/show_bug.cgi?id=1109263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=17048
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362
https://ubuntu.com/security/notices/USN-2306-1
| +| glibc-devel | CVE-2015-8982 | LOW | 2.17-292.el7 | |
Expand...http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
| +| glibc-devel | CVE-2015-8984 | LOW | 2.17-292.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
| +| glibc-devel | CVE-2015-8985 | LOW | 2.17-292.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| +| glibc-devel | CVE-2016-10228 | LOW | 2.17-292.el7 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| glibc-devel | CVE-2017-15671 | LOW | 2.17-292.el7 | |
Expand...http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
| +| glibc-devel | CVE-2019-19126 | LOW | 2.17-292.el7 | 2.17-317.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| glibc-devel | CVE-2020-27618 | LOW | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| glibc-devel | CVE-2021-33574 | LOW | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| glibc-headers | CVE-2009-5155 | MEDIUM | 2.17-292.el7 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| +| glibc-headers | CVE-2015-8983 | MEDIUM | 2.17-292.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
| +| glibc-headers | CVE-2016-1234 | MEDIUM | 2.17-292.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
| +| glibc-headers | CVE-2016-4429 | MEDIUM | 2.17-292.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
| +| glibc-headers | CVE-2017-8804 | MEDIUM | 2.17-292.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
http://www.openwall.com/lists/oss-security/2017/05/05/2
http://www.securityfocus.com/bid/98339
https://access.redhat.com/security/cve/CVE-2017-8804
https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
https://seclists.org/oss-sec/2017/q2/228
https://sourceware.org/bugzilla/show_bug.cgi?id=21461
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
| +| glibc-headers | CVE-2019-25013 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| glibc-headers | CVE-2019-9169 | MEDIUM | 2.17-292.el7 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| glibc-headers | CVE-2020-10029 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| glibc-headers | CVE-2020-1752 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| glibc-headers | CVE-2020-29573 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-29573
https://linux.oracle.com/cve/CVE-2020-29573.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26649
https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
| +| glibc-headers | CVE-2021-35942 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| glibc-headers | CVE-2021-3999 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| glibc-headers | CVE-2022-23218 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| glibc-headers | CVE-2022-23219 | MEDIUM | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| glibc-headers | CVE-2014-4043 | LOW | 2.17-292.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
http://www.openwall.com/lists/oss-security/2014/06/13/2
http://www.securityfocus.com/bid/68006
https://access.redhat.com/security/cve/CVE-2014-4043
https://bugzilla.redhat.com/show_bug.cgi?id=1109263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=17048
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362
https://ubuntu.com/security/notices/USN-2306-1
| +| glibc-headers | CVE-2015-8982 | LOW | 2.17-292.el7 | |
Expand...http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
| +| glibc-headers | CVE-2015-8984 | LOW | 2.17-292.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
| +| glibc-headers | CVE-2015-8985 | LOW | 2.17-292.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| +| glibc-headers | CVE-2016-10228 | LOW | 2.17-292.el7 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| glibc-headers | CVE-2017-15671 | LOW | 2.17-292.el7 | |
Expand...http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
| +| glibc-headers | CVE-2019-19126 | LOW | 2.17-292.el7 | 2.17-317.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| glibc-headers | CVE-2020-27618 | LOW | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| glibc-headers | CVE-2021-33574 | LOW | 2.17-292.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| gmp | CVE-2021-43618 | LOW | 1:6.0.0-15.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
| +| gnupg2 | CVE-2014-4617 | MEDIUM | 2.0.22-5.el7_5 | |
Expand...http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000345.html
http://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html
http://secunia.com/advisories/59213
http://secunia.com/advisories/59351
http://secunia.com/advisories/59534
http://secunia.com/advisories/59578
http://www.debian.org/security/2014/dsa-2967
http://www.debian.org/security/2014/dsa-2968
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.ubuntu.com/usn/USN-2258-1
https://access.redhat.com/security/cve/CVE-2014-4617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
https://ubuntu.com/security/notices/USN-2258-1
| +| gnupg2 | CVE-2019-13050 | MEDIUM | 2.0.22-5.el7_5 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://errata.almalinux.org/8/ALSA-2020-4490.html
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
| +| gnupg2 | CVE-2014-3591 | LOW | 2.0.22-5.el7_5 | |
Expand...http://www.cs.tau.ac.il/~tromer/radioexp/
http://www.debian.org/security/2015/dsa-3184
http://www.debian.org/security/2015/dsa-3185
https://access.redhat.com/security/cve/CVE-2014-3591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
https://ubuntu.com/security/notices/USN-2554-1
https://ubuntu.com/security/notices/USN-2555-1
| +| gnupg2 | CVE-2015-0837 | LOW | 2.0.22-5.el7_5 | |
Expand...http://www.debian.org/security/2015/dsa-3184
http://www.debian.org/security/2015/dsa-3185
https://access.redhat.com/security/cve/CVE-2015-0837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837
https://ieeexplore.ieee.org/document/7163050
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
https://ubuntu.com/security/notices/USN-2554-1
https://ubuntu.com/security/notices/USN-2555-1
| +| gnupg2 | CVE-2015-1606 | LOW | 2.0.22-5.el7_5 | |
Expand...http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648
http://www.debian.org/security/2015/dsa-3184
http://www.openwall.com/lists/oss-security/2015/02/13/14
http://www.openwall.com/lists/oss-security/2015/02/14/6
http://www.securitytracker.com/id/1031876
https://access.redhat.com/security/cve/CVE-2015-1606
https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606
https://ubuntu.com/security/notices/USN-2554-1
| +| gnupg2 | CVE-2015-1607 | LOW | 2.0.22-5.el7_5 | |
Expand...http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2183683bd633818dd031b090b5530951de76f392
http://www.openwall.com/lists/oss-security/2015/02/13/14
http://www.openwall.com/lists/oss-security/2015/02/14/6
http://www.securityfocus.com/bid/72610
http://www.ubuntu.com/usn/usn-2554-1/
https://access.redhat.com/security/cve/CVE-2015-1607
https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1607
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000361.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000362.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://ubuntu.com/security/notices/USN-2554-1
| +| gnupg2 | CVE-2018-9234 | LOW | 2.0.22-5.el7_5 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-9234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234
https://dev.gnupg.org/T3844
https://ubuntu.com/security/notices/USN-3675-1
https://usn.ubuntu.com/3675-1/
| +| gpgme | CVE-2014-3564 | LOW | 1.3.2-5.el7 | |
Expand...http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://seclists.org/oss-sec/2014/q3/266
http://www.debian.org/security/2014/dsa-3005
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.osvdb.org/109699
http://www.securityfocus.com/bid/68990
https://access.redhat.com/security/cve/CVE-2014-3564
https://bugzilla.redhat.com/show_bug.cgi?id=1113267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564
https://ubuntu.com/security/notices/USN-2307-1
| +| gzip | CVE-2022-1271 | HIGH | 1.5-10.el7 | 1.5-11.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-2191.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
| +| json-c | CVE-2020-12762 | MEDIUM | 0.11-4.el7_0 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12762
https://github.com/json-c/json-c/pull/592
https://github.com/rsyslog/libfastjson/issues/161
https://linux.oracle.com/cve/CVE-2020-12762.html
https://linux.oracle.com/errata/ELSA-2021-4382.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/
https://nvd.nist.gov/vuln/detail/CVE-2020-12762
https://security.gentoo.org/glsa/202006-13
https://security.netapp.com/advisory/ntap-20210521-0001/
https://ubuntu.com/security/notices/USN-4360-1
https://ubuntu.com/security/notices/USN-4360-4
https://usn.ubuntu.com/4360-1/
https://usn.ubuntu.com/4360-4/
https://www.debian.org/security/2020/dsa-4741
| +| kernel-headers | CVE-2016-5195 | HIGH | 3.10.0-1062.7.1.el7 | 4.5.0-15.2.1.el7 |
Expand...http://fortiguard.com/advisory/FG-IR-16-063
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html
http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html
http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html
http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html
http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html
http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html
http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html
http://rhn.redhat.com/errata/RHSA-2016-2098.html
http://rhn.redhat.com/errata/RHSA-2016-2105.html
http://rhn.redhat.com/errata/RHSA-2016-2106.html
http://rhn.redhat.com/errata/RHSA-2016-2107.html
http://rhn.redhat.com/errata/RHSA-2016-2110.html
http://rhn.redhat.com/errata/RHSA-2016-2118.html
http://rhn.redhat.com/errata/RHSA-2016-2120.html
http://rhn.redhat.com/errata/RHSA-2016-2124.html
http://rhn.redhat.com/errata/RHSA-2016-2126.html
http://rhn.redhat.com/errata/RHSA-2016-2127.html
http://rhn.redhat.com/errata/RHSA-2016-2128.html
http://rhn.redhat.com/errata/RHSA-2016-2132.html
http://rhn.redhat.com/errata/RHSA-2016-2133.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux
http://www.debian.org/security/2016/dsa-3696
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3
http://www.openwall.com/lists/oss-security/2016/10/21/1
http://www.openwall.com/lists/oss-security/2016/10/26/7
http://www.openwall.com/lists/oss-security/2016/10/27/13
http://www.openwall.com/lists/oss-security/2016/10/30/1
http://www.openwall.com/lists/oss-security/2016/11/03/7
http://www.openwall.com/lists/oss-security/2022/03/07/1
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/archive/1/539611/100/0/threaded
http://www.securityfocus.com/archive/1/540252/100/0/threaded
http://www.securityfocus.com/archive/1/540344/100/0/threaded
http://www.securityfocus.com/archive/1/540736/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded
http://www.securityfocus.com/bid/93793
http://www.securitytracker.com/id/1037078
http://www.ubuntu.com/usn/USN-3104-1
http://www.ubuntu.com/usn/USN-3104-2
http://www.ubuntu.com/usn/USN-3105-1
http://www.ubuntu.com/usn/USN-3105-2
http://www.ubuntu.com/usn/USN-3106-1
http://www.ubuntu.com/usn/USN-3106-2
http://www.ubuntu.com/usn/USN-3106-3
http://www.ubuntu.com/usn/USN-3106-4
http://www.ubuntu.com/usn/USN-3107-1
http://www.ubuntu.com/usn/USN-3107-2
https://access.redhat.com/errata/RHSA-2017:0372
https://access.redhat.com/security/cve/CVE-2016-5195
https://access.redhat.com/security/cve/cve-2016-5195
https://access.redhat.com/security/vulnerabilities/2706661
https://bto.bluecoat.com/security-advisory/sa134
https://bugzilla.redhat.com/show_bug.cgi?id=1384344
https://bugzilla.suse.com/show_bug.cgi?id=1004418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195
https://dirtycow.ninja
https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs
https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03707en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03722en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03742en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03761en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
https://kc.mcafee.com/corporate/index?page=content&id=SB10176
https://kc.mcafee.com/corporate/index?page=content&id=SB10177
https://kc.mcafee.com/corporate/index?page=content&id=SB10222
https://linux.oracle.com/cve/CVE-2016-5195.html
https://linux.oracle.com/errata/ELSA-2016-3634.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html
https://security-tracker.debian.org/tracker/CVE-2016-5195
https://security.netapp.com/advisory/ntap-20161025-0001/
https://security.paloaltonetworks.com/CVE-2016-5195
https://source.android.com/security/bulletin/2016-11-01.html
https://source.android.com/security/bulletin/2016-12-01.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd
https://ubuntu.com/security/notices/USN-3104-1
https://ubuntu.com/security/notices/USN-3104-2
https://ubuntu.com/security/notices/USN-3105-1
https://ubuntu.com/security/notices/USN-3105-2
https://ubuntu.com/security/notices/USN-3106-1
https://ubuntu.com/security/notices/USN-3106-2
https://ubuntu.com/security/notices/USN-3106-3
https://ubuntu.com/security/notices/USN-3106-4
https://ubuntu.com/security/notices/USN-3107-1
https://ubuntu.com/security/notices/USN-3107-2
https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026
https://www.exploit-db.com/exploits/40611/
https://www.exploit-db.com/exploits/40616/
https://www.exploit-db.com/exploits/40839/
https://www.exploit-db.com/exploits/40847/
https://www.kb.cert.org/vuls/id/243144
| +| kernel-headers | CVE-2016-7039 | HIGH | 3.10.0-1062.7.1.el7 | 4.5.0-15.2.1.el7 |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2047.html
http://rhn.redhat.com/errata/RHSA-2016-2107.html
http://rhn.redhat.com/errata/RHSA-2016-2110.html
http://www.openwall.com/lists/oss-security/2016/10/10/15
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/93476
https://access.redhat.com/errata/RHSA-2017:0372
https://access.redhat.com/security/cve/CVE-2016-7039
https://bto.bluecoat.com/security-advisory/sa134
https://bugzilla.redhat.com/show_bug.cgi?id=1375944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7039
https://linux.oracle.com/cve/CVE-2016-7039.html
https://linux.oracle.com/errata/ELSA-2016-3626.html
https://patchwork.ozlabs.org/patch/680412/
https://ubuntu.com/security/notices/USN-3098-1
https://ubuntu.com/security/notices/USN-3098-2
https://ubuntu.com/security/notices/USN-3099-1
https://ubuntu.com/security/notices/USN-3099-2
https://ubuntu.com/security/notices/USN-3099-3
https://ubuntu.com/security/notices/USN-3099-4
https://www.mail-archive.com/netdev@vger.kernel.org/msg132064.html
| +| kernel-headers | CVE-2016-8666 | HIGH | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fac8e0f579695a3ecbc4d3cac369139d7f819971
http://rhn.redhat.com/errata/RHSA-2016-2047.html
http://rhn.redhat.com/errata/RHSA-2016-2107.html
http://rhn.redhat.com/errata/RHSA-2016-2110.html
http://rhn.redhat.com/errata/RHSA-2017-0004.html
http://www.openwall.com/lists/oss-security/2016/10/13/11
http://www.openwall.com/lists/oss-security/2016/10/14/3
http://www.securityfocus.com/bid/93562
https://access.redhat.com/errata/RHSA-2017:0372
https://access.redhat.com/security/cve/CVE-2016-8666
https://bto.bluecoat.com/security-advisory/sa134
https://bugzilla.redhat.com/show_bug.cgi?id=1384991
https://bugzilla.suse.com/show_bug.cgi?id=1001486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8666
https://github.com/torvalds/linux/commit/fac8e0f579695a3ecbc4d3cac369139d7f819971
https://linux.oracle.com/cve/CVE-2016-8666.html
https://linux.oracle.com/errata/ELSA-2017-3508.html
| +| kernel-headers | CVE-2017-1000112 | HIGH | 3.10.0-1062.7.1.el7 | |
Expand...http://seclists.org/oss-sec/2017/q3/277
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100262
http://www.securitytracker.com/id/1039162
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2017:3200
https://access.redhat.com/errata/RHSA-2019:1931
https://access.redhat.com/errata/RHSA-2019:1932
https://access.redhat.com/errata/RHSA-2019:4159
https://access.redhat.com/security/cve/CVE-2017-1000112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=85f1bd9a7b5a79d5baa8bf44af19658f7bf77bfa
https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112
https://linux.oracle.com/cve/CVE-2017-1000112.html
https://linux.oracle.com/errata/ELSA-2017-3631.html
https://ubuntu.com/security/notices/USN-3384-1
https://ubuntu.com/security/notices/USN-3384-2
https://ubuntu.com/security/notices/USN-3385-1
https://ubuntu.com/security/notices/USN-3385-2
https://ubuntu.com/security/notices/USN-3386-1
https://ubuntu.com/security/notices/USN-3386-2
https://www.exploit-db.com/exploits/45147/
| +| kernel-headers | CVE-2017-1000251 | HIGH | 3.10.0-1062.7.1.el7 | |
Expand...http://nvidia.custhelp.com/app/answers/detail/a_id/4561
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100809
http://www.securitytracker.com/id/1039373
https://access.redhat.com/blogs/product-security/posts/blueborne
https://access.redhat.com/errata/RHSA-2017:2679
https://access.redhat.com/errata/RHSA-2017:2680
https://access.redhat.com/errata/RHSA-2017:2681
https://access.redhat.com/errata/RHSA-2017:2682
https://access.redhat.com/errata/RHSA-2017:2683
https://access.redhat.com/errata/RHSA-2017:2704
https://access.redhat.com/errata/RHSA-2017:2705
https://access.redhat.com/errata/RHSA-2017:2706
https://access.redhat.com/errata/RHSA-2017:2707
https://access.redhat.com/errata/RHSA-2017:2731
https://access.redhat.com/errata/RHSA-2017:2732
https://access.redhat.com/security/cve/CVE-2017-1000251
https://access.redhat.com/security/vulnerabilities/blueborne
https://access.redhat.com/solutions/3177231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251
https://github.com/torvalds/linux/commit/f2fcfcd670257236ebf2088bbdf26f6a8ef459fe
https://linux.oracle.com/cve/CVE-2017-1000251.html
https://linux.oracle.com/errata/ELSA-2017-3622.html
https://ubuntu.com/security/notices/USN-3419-1
https://ubuntu.com/security/notices/USN-3419-2
https://ubuntu.com/security/notices/USN-3420-1
https://ubuntu.com/security/notices/USN-3420-2
https://ubuntu.com/security/notices/USN-3422-1
https://ubuntu.com/security/notices/USN-3422-2
https://ubuntu.com/security/notices/USN-3423-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BlueBorne
https://www.armis.com/blueborne
https://www.armis.com/blueborne/
https://www.exploit-db.com/exploits/42762/
https://www.kb.cert.org/vuls/id/240311
https://www.synology.com/support/security/Synology_SA_17_52_BlueBorne
| +| kernel-headers | CVE-2017-1000405 | HIGH | 3.10.0-1062.7.1.el7 | 4.11.0-44.4.1.el7a |
Expand...http://www.openwall.com/lists/oss-security/2017/11/30/1
http://www.securityfocus.com/bid/102032
http://www.securitytracker.com/id/1040020
https://access.redhat.com/errata/RHSA-2018:0180
https://access.redhat.com/security/cve/CVE-2017-1000405
https://bugzilla.redhat.com/show_bug.cgi?id=1516514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000405
https://linux.oracle.com/cve/CVE-2017-1000405.html
https://linux.oracle.com/errata/ELSA-2017-3651.html
https://medium.com/bindecy/huge-dirty-cow-cve-2017-1000405-110eca132de0
https://source.android.com/security/bulletin/pixel/2018-02-01
https://ubuntu.com/security/notices/USN-3507-1
https://ubuntu.com/security/notices/USN-3507-2
https://ubuntu.com/security/notices/USN-3508-1
https://ubuntu.com/security/notices/USN-3508-2
https://ubuntu.com/security/notices/USN-3509-1
https://ubuntu.com/security/notices/USN-3509-2
https://ubuntu.com/security/notices/USN-3510-1
https://ubuntu.com/security/notices/USN-3510-2
https://ubuntu.com/security/notices/USN-3511-1
https://www.exploit-db.com/exploits/43199/
| +| kernel-headers | CVE-2017-13166 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1130
https://access.redhat.com/errata/RHSA-2018:1170
https://access.redhat.com/errata/RHSA-2018:1319
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2017-13166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
https://github.com/LineageOS/android_kernel_samsung_apq8084/commit/97b733953c06e4f0398ade18850f0817778255f7
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2017-13166.html
https://linux.oracle.com/errata/ELSA-2018-1319.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://source.android.com/security/bulletin/pixel/2017-12-01
https://www.debian.org/security/2018/dsa-4120
https://www.debian.org/security/2018/dsa-4187
| +| kernel-headers | CVE-2017-15649 | HIGH | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e
http://patchwork.ozlabs.org/patch/813945/
http://patchwork.ozlabs.org/patch/818726/
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6
http://www.securityfocus.com/bid/101573
https://access.redhat.com/errata/RHSA-2018:0151
https://access.redhat.com/errata/RHSA-2018:0152
https://access.redhat.com/errata/RHSA-2018:0181
https://access.redhat.com/security/cve/CVE-2017-15649
https://blogs.securiteam.com/index.php/archives/3484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15649
https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110
https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e
https://linux.oracle.com/cve/CVE-2017-15649.html
https://linux.oracle.com/errata/ELSA-2018-0151.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-16939 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1137b5e2529a8f5ca8ee709288ecba3e68044df2
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://seclists.org/fulldisclosure/2017/Nov/40
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
http://www.securityfocus.com/bid/101954
https://access.redhat.com/errata/RHSA-2018:1318
https://access.redhat.com/errata/RHSA-2018:1355
https://access.redhat.com/errata/RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1190
https://access.redhat.com/security/cve/CVE-2017-16939
https://blogs.securiteam.com/index.php/archives/3535
https://bugzilla.suse.com/show_bug.cgi?id=1069702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
https://github.com/torvalds/linux/commit/1137b5e2529a8f5ca8ee709288ecba3e68044df2
https://linux.oracle.com/cve/CVE-2017-16939.html
https://linux.oracle.com/errata/ELSA-2018-4131.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3507-1
https://ubuntu.com/security/notices/USN-3507-2
https://ubuntu.com/security/notices/USN-3508-1
https://ubuntu.com/security/notices/USN-3508-2
https://ubuntu.com/security/notices/USN-3509-1
https://ubuntu.com/security/notices/USN-3509-2
https://ubuntu.com/security/notices/USN-3510-1
https://ubuntu.com/security/notices/USN-3510-2
https://ubuntu.com/security/notices/USN-3511-1
https://www.debian.org/security/2018/dsa-4082
| +| kernel-headers | CVE-2017-17712 | HIGH | 3.10.0-1062.7.1.el7 | 4.11.0-44.6.1.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f659a03a0ba9289b9aeb9b4470e6fb263d6f483
http://www.openwall.com/lists/oss-security/2017/12/16/1
https://access.redhat.com/errata/RHSA-2018:0502
https://access.redhat.com/security/cve/CVE-2017-17712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8f659a03a0ba9289b9aeb9b4470e6fb263d6f483
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c008ba5bdc9fa830e1a349b20b0be5a137bdef7a
https://github.com/torvalds/linux/commit/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483
https://linux.oracle.com/cve/CVE-2017-17712.html
https://linux.oracle.com/errata/ELSA-2018-4025.html
https://source.android.com/security/bulletin/pixel/2018-04-01
https://ubuntu.com/security/notices/USN-3581-1
https://ubuntu.com/security/notices/USN-3581-2
https://ubuntu.com/security/notices/USN-3581-3
https://ubuntu.com/security/notices/USN-3582-1
https://ubuntu.com/security/notices/USN-3582-2
https://usn.ubuntu.com/3581-1/
https://usn.ubuntu.com/3581-2/
https://usn.ubuntu.com/3581-3/
https://usn.ubuntu.com/3582-1/
https://usn.ubuntu.com/3582-2/
https://www.debian.org/security/2017/dsa-4073
| +| kernel-headers | CVE-2017-18202 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-49.13.1.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=687cb0884a714ff484d038e9190edc874edcf146
http://www.securityfocus.com/bid/103161
https://access.redhat.com/errata/RHSA-2018:2772
https://access.redhat.com/security/cve/CVE-2017-18202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18202
https://github.com/torvalds/linux/commit/687cb0884a714ff484d038e9190edc874edcf146
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.4
| +| kernel-headers | CVE-2017-18344 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://www.openwall.com/lists/oss-security/2018/08/09/6
http://www.securityfocus.com/bid/104909
http://www.securitytracker.com/id/1041414
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2018:3459
https://access.redhat.com/errata/RHSA-2018:3540
https://access.redhat.com/errata/RHSA-2018:3586
https://access.redhat.com/errata/RHSA-2018:3590
https://access.redhat.com/errata/RHSA-2018:3591
https://access.redhat.com/security/cve/CVE-2017-18344
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18344
https://github.com/torvalds/linux/commit/cef31d9af908243421258f1df35a4a644604efbe
https://linux.oracle.com/cve/CVE-2017-18344.html
https://linux.oracle.com/errata/ELSA-2018-4214.html
https://ubuntu.com/security/notices/USN-3742-1
https://ubuntu.com/security/notices/USN-3742-2
https://usn.ubuntu.com/3742-1/
https://usn.ubuntu.com/3742-2/
https://www.exploit-db.com/exploits/45175/
| +| kernel-headers | CVE-2017-18595 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.21.2.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
https://access.redhat.com/security/cve/CVE-2017-18595
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595
https://git.kernel.org/linus/4397f04575c44e1440ec2e49b6302785c95fd2f8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8
https://linux.oracle.com/cve/CVE-2017-18595.html
https://linux.oracle.com/errata/ELSA-2020-5508.html
| +| kernel-headers | CVE-2017-5715 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-49.8.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
http://nvidia.custhelp.com/app/answers/detail/a_id/4609
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
http://www.amd.com/en/corporate/speculative-execution
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
http://www.kb.cert.org/vuls/id/584653
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/102376
http://www.securitytracker.com/id/1040071
http://xenbits.xen.org/xsa/advisory-254.html
https://access.redhat.com/errata/RHSA-2018:0292
https://access.redhat.com/security/cve/CVE-2017-5715
https://access.redhat.com/security/vulnerabilities/speculativeexecution
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://cert.vde.com/en-us/advisories/vde-2018-002
https://cert.vde.com/en-us/advisories/vde-2018-003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/security-update
https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
https://linux.oracle.com/cve/CVE-2017-5715.html
https://linux.oracle.com/errata/ELSA-2019-4785.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
https://meltdownattack.com
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
https://seclists.org/bugtraq/2019/Jun/36
https://seclists.org/bugtraq/2019/Nov/16
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
https://security.gentoo.org/glsa/201810-06
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
https://security.netapp.com/advisory/ntap-20180104-0001/
https://security.paloaltonetworks.com/CVE-2017-5715
https://spectreattack.com/
https://support.citrix.com/article/CTX231399
https://support.f5.com/csp/article/K91229003
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
https://support.lenovo.com/us/en/solutions/LEN-18282
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
https://ubuntu.com/security/notices/USN-3516-1
https://ubuntu.com/security/notices/USN-3530-1
https://ubuntu.com/security/notices/USN-3531-1
https://ubuntu.com/security/notices/USN-3531-2
https://ubuntu.com/security/notices/USN-3531-3
https://ubuntu.com/security/notices/USN-3540-1
https://ubuntu.com/security/notices/USN-3540-2
https://ubuntu.com/security/notices/USN-3541-1
https://ubuntu.com/security/notices/USN-3541-2
https://ubuntu.com/security/notices/USN-3542-1
https://ubuntu.com/security/notices/USN-3542-2
https://ubuntu.com/security/notices/USN-3549-1
https://ubuntu.com/security/notices/USN-3560-1
https://ubuntu.com/security/notices/USN-3561-1
https://ubuntu.com/security/notices/USN-3580-1
https://ubuntu.com/security/notices/USN-3581-1
https://ubuntu.com/security/notices/USN-3581-2
https://ubuntu.com/security/notices/USN-3582-1
https://ubuntu.com/security/notices/USN-3582-2
https://ubuntu.com/security/notices/USN-3594-1
https://ubuntu.com/security/notices/USN-3597-1
https://ubuntu.com/security/notices/USN-3597-2
https://ubuntu.com/security/notices/USN-3620-2
https://ubuntu.com/security/notices/USN-3690-1
https://ubuntu.com/security/notices/USN-3777-3
https://usn.ubuntu.com/3531-1/
https://usn.ubuntu.com/3531-3/
https://usn.ubuntu.com/3540-2/
https://usn.ubuntu.com/3541-2/
https://usn.ubuntu.com/3542-2/
https://usn.ubuntu.com/3549-1/
https://usn.ubuntu.com/3560-1/
https://usn.ubuntu.com/3561-1/
https://usn.ubuntu.com/3580-1/
https://usn.ubuntu.com/3581-1/
https://usn.ubuntu.com/3581-2/
https://usn.ubuntu.com/3582-1/
https://usn.ubuntu.com/3582-2/
https://usn.ubuntu.com/3594-1/
https://usn.ubuntu.com/3597-1/
https://usn.ubuntu.com/3597-2/
https://usn.ubuntu.com/3620-2/
https://usn.ubuntu.com/3690-1/
https://usn.ubuntu.com/3777-3/
https://usn.ubuntu.com/usn/usn-3516-1/
https://webkitgtk.org/security/WSA-2018-0001.html
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
https://www.debian.org/security/2018/dsa-4120
https://www.debian.org/security/2018/dsa-4187
https://www.debian.org/security/2018/dsa-4188
https://www.debian.org/security/2018/dsa-4213
https://www.exploit-db.com/exploits/43427/
https://www.kb.cert.org/vuls/id/180049
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.qemu.org/2018/01/04/spectre/
https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
https://www.synology.com/support/security/Synology_SA_18_01
https://www.vmware.com/security/advisories/VMSA-2018-0007.html
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
| +| kernel-headers | CVE-2017-5753 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
http://nvidia.custhelp.com/app/answers/detail/a_id/4609
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
http://www.amd.com/en/corporate/speculative-execution
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
http://www.kb.cert.org/vuls/id/584653
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/102371
http://www.securitytracker.com/id/1040071
http://xenbits.xen.org/xsa/advisory-254.html
https://access.redhat.com/errata/RHSA-2018:0292
https://access.redhat.com/security/cve/CVE-2017-5753
https://access.redhat.com/security/vulnerabilities/speculativeexecution
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
https://cdrdv2.intel.com/v1/dl/getContent/685359
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://cert.vde.com/en-us/advisories/vde-2018-002
https://cert.vde.com/en-us/advisories/vde-2018-003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/security-update
https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
https://linux.oracle.com/cve/CVE-2017-5753.html
https://linux.oracle.com/errata/ELSA-2019-4785.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://meltdownattack.com
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
https://seclists.org/bugtraq/2019/Jun/36
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
https://security.gentoo.org/glsa/201810-06
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
https://security.netapp.com/advisory/ntap-20180104-0001/
https://spectreattack.com/
https://support.citrix.com/article/CTX231399
https://support.f5.com/csp/article/K91229003
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
https://support.lenovo.com/us/en/solutions/LEN-18282
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
https://ubuntu.com/security/notices/USN-3516-1
https://ubuntu.com/security/notices/USN-3521-1
https://ubuntu.com/security/notices/USN-3530-1
https://ubuntu.com/security/notices/USN-3540-1
https://ubuntu.com/security/notices/USN-3540-2
https://ubuntu.com/security/notices/USN-3541-1
https://ubuntu.com/security/notices/USN-3541-2
https://ubuntu.com/security/notices/USN-3542-1
https://ubuntu.com/security/notices/USN-3542-2
https://ubuntu.com/security/notices/USN-3549-1
https://ubuntu.com/security/notices/USN-3580-1
https://ubuntu.com/security/notices/USN-3597-1
https://ubuntu.com/security/notices/USN-3597-2
https://usn.ubuntu.com/3540-1/
https://usn.ubuntu.com/3540-2/
https://usn.ubuntu.com/3541-1/
https://usn.ubuntu.com/3541-2/
https://usn.ubuntu.com/3542-1/
https://usn.ubuntu.com/3542-2/
https://usn.ubuntu.com/3549-1/
https://usn.ubuntu.com/3580-1/
https://usn.ubuntu.com/3597-1/
https://usn.ubuntu.com/3597-2/
https://usn.ubuntu.com/usn/usn-3516-1/
https://webkitgtk.org/security/WSA-2018-0001.html
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
https://www.debian.org/security/2018/dsa-4187
https://www.debian.org/security/2018/dsa-4188
https://www.exploit-db.com/exploits/43427/
https://www.kb.cert.org/vuls/id/180049
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
https://www.synology.com/support/security/Synology_SA_18_01
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
| +| kernel-headers | CVE-2017-5754 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-49.2.2.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
http://nvidia.custhelp.com/app/answers/detail/a_id/4609
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
http://www.amd.com/en/corporate/speculative-execution
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
http://www.kb.cert.org/vuls/id/584653
http://www.securityfocus.com/bid/102378
http://www.securityfocus.com/bid/106128
http://www.securitytracker.com/id/1040071
http://xenbits.xen.org/xsa/advisory-254.html
https://access.redhat.com/errata/RHSA-2018:0292
https://access.redhat.com/security/cve/CVE-2017-5754
https://access.redhat.com/security/vulnerabilities/speculativeexecution
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
https://cdrdv2.intel.com/v1/dl/getContent/685358
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://cert.vde.com/en-us/advisories/vde-2018-002
https://cert.vde.com/en-us/advisories/vde-2018-003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/security-update
https://github.com/IAIK/KAISER
https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
https://gruss.cc/files/kaiser.pdf
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
https://linux.oracle.com/cve/CVE-2017-5754.html
https://linux.oracle.com/errata/ELSA-2019-4585.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://meltdownattack.com
https://meltdownattack.com/
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
https://security.gentoo.org/glsa/201810-06
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
https://security.netapp.com/advisory/ntap-20180104-0001/
https://source.android.com/security/bulletin/2018-04-01
https://spectreattack.com/
https://support.citrix.com/article/CTX231399
https://support.citrix.com/article/CTX234679
https://support.f5.com/csp/article/K91229003
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
https://support.lenovo.com/us/en/solutions/LEN-18282
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
https://ubuntu.com/security/notices/USN-3516-1
https://ubuntu.com/security/notices/USN-3522-1
https://ubuntu.com/security/notices/USN-3522-2
https://ubuntu.com/security/notices/USN-3523-1
https://ubuntu.com/security/notices/USN-3523-2
https://ubuntu.com/security/notices/USN-3524-1
https://ubuntu.com/security/notices/USN-3524-2
https://ubuntu.com/security/notices/USN-3525-1
https://ubuntu.com/security/notices/USN-3540-1
https://ubuntu.com/security/notices/USN-3540-2
https://ubuntu.com/security/notices/USN-3541-1
https://ubuntu.com/security/notices/USN-3541-2
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3597-1
https://ubuntu.com/security/notices/USN-3597-2
https://usn.ubuntu.com/3522-3/
https://usn.ubuntu.com/3522-4/
https://usn.ubuntu.com/3523-1/
https://usn.ubuntu.com/3540-2/
https://usn.ubuntu.com/3541-2/
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3597-1/
https://usn.ubuntu.com/3597-2/
https://usn.ubuntu.com/usn/usn-3516-1/
https://usn.ubuntu.com/usn/usn-3522-2/
https://usn.ubuntu.com/usn/usn-3523-2/
https://usn.ubuntu.com/usn/usn-3524-2/
https://usn.ubuntu.com/usn/usn-3525-1/
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin
https://www.debian.org/security/2018/dsa-4078
https://www.debian.org/security/2018/dsa-4082
https://www.debian.org/security/2018/dsa-4120
https://www.kb.cert.org/vuls/id/180049
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
https://www.synology.com/support/security/Synology_SA_18_01
| +| kernel-headers | CVE-2017-7533 | HIGH | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=49d31c2f389acfe83417083e1208422b4091cd9e
http://openwall.com/lists/oss-security/2017/08/03/2
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.openwall.com/lists/oss-security/2019/06/27/7
http://www.openwall.com/lists/oss-security/2019/06/28/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.securityfocus.com/bid/100123
http://www.securitytracker.com/id/1039075
https://access.redhat.com/errata/RHSA-2017:2473
https://access.redhat.com/errata/RHSA-2017:2585
https://access.redhat.com/errata/RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2017:2770
https://access.redhat.com/errata/RHSA-2017:2869
https://access.redhat.com/security/cve/CVE-2017-7533
https://bugzilla.redhat.com/show_bug.cgi?id=1468283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533
https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e
https://linux.oracle.com/cve/CVE-2017-7533.html
https://linux.oracle.com/errata/ELSA-2017-3605.html
https://patchwork.kernel.org/patch/9755753/
https://patchwork.kernel.org/patch/9755757/
https://source.android.com/security/bulletin/2017-12-01
https://ubuntu.com/security/notices/USN-3377-1
https://ubuntu.com/security/notices/USN-3377-2
https://ubuntu.com/security/notices/USN-3378-1
https://ubuntu.com/security/notices/USN-3378-2
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1408967.html
| +| kernel-headers | CVE-2017-8797 | HIGH | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b550a32e60a4941994b437a8d662432a486235a5
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f961e3f2acae94b727380c0b74e2d3954d0edf79
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3
http://www.openwall.com/lists/oss-security/2017/06/27/5
http://www.securityfocus.com/bid/99298
http://www.securitytracker.com/id/1038790
https://access.redhat.com/errata/RHSA-2017:1842
https://access.redhat.com/errata/RHSA-2017:2077
https://access.redhat.com/errata/RHSA-2017:2437
https://access.redhat.com/errata/RHSA-2017:2669
https://access.redhat.com/security/cve/CVE-2017-8797
https://bugzilla.redhat.com/show_bug.cgi?id=1466329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797
https://github.com/torvalds/linux/commit/b550a32e60a4941994b437a8d662432a486235a5
https://github.com/torvalds/linux/commit/f961e3f2acae94b727380c0b74e2d3954d0edf79
https://linux.oracle.com/cve/CVE-2017-8797.html
https://linux.oracle.com/errata/ELSA-2017-1842.html
| +| kernel-headers | CVE-2018-1000199 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-49.2.2.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://openwall.com/lists/oss-security/2018/05/01/3
http://www.securitytracker.com/id/1040806
https://access.redhat.com/errata/RHSA-2018:1318
https://access.redhat.com/errata/RHSA-2018:1345
https://access.redhat.com/errata/RHSA-2018:1347
https://access.redhat.com/errata/RHSA-2018:1348
https://access.redhat.com/errata/RHSA-2018:1354
https://access.redhat.com/errata/RHSA-2018:1355
https://access.redhat.com/errata/RHSA-2018:1374
https://access.redhat.com/security/cve/CVE-2018-1000199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
https://linux.oracle.com/cve/CVE-2018-1000199.html
https://linux.oracle.com/errata/ELSA-2018-4145.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://lkml.org/lkml/2018/4/6/813
https://ubuntu.com/security/notices/USN-3641-1
https://ubuntu.com/security/notices/USN-3641-2
https://usn.ubuntu.com/3641-1/
https://usn.ubuntu.com/3641-2/
https://www.debian.org/security/2018/dsa-4187
https://www.debian.org/security/2018/dsa-4188
| +| kernel-headers | CVE-2018-1068 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://www.securityfocus.com/bid/103459
https://access.redhat.com/errata/RHSA-2018:1318
https://access.redhat.com/errata/RHSA-2018:1355
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1190
https://access.redhat.com/errata/RHSA-2019:4159
https://access.redhat.com/security/cve/CVE-2018-1068
https://bugzilla.redhat.com/show_bug.cgi?id=1552048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
https://git.kernel.org/linus/b71812168571fa55e44cdd0254471331b9c4c4c6
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6
https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6
https://linux.oracle.com/cve/CVE-2018-1068.html
https://linux.oracle.com/errata/ELSA-2018-4110.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://marc.info/?l=linux-netdev&m=152023808817590&w=2
https://marc.info/?l=linux-netdev&m=152025888924151&w=2
https://marc.info/?l=linux-netdev&m=152023808817590&w=2
https://marc.info/?l=linux-netdev&m=152025888924151&w=2
https://ubuntu.com/security/notices/USN-3654-1
https://ubuntu.com/security/notices/USN-3654-2
https://ubuntu.com/security/notices/USN-3656-1
https://ubuntu.com/security/notices/USN-3674-1
https://ubuntu.com/security/notices/USN-3674-2
https://ubuntu.com/security/notices/USN-3677-1
https://ubuntu.com/security/notices/USN-3677-2
https://usn.ubuntu.com/3654-1/
https://usn.ubuntu.com/3654-2/
https://usn.ubuntu.com/3656-1/
https://usn.ubuntu.com/3674-1/
https://usn.ubuntu.com/3674-2/
https://usn.ubuntu.com/3677-1/
https://usn.ubuntu.com/3677-2/
https://www.debian.org/security/2018/dsa-4187
https://www.debian.org/security/2018/dsa-4188
| +| kernel-headers | CVE-2018-10902 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.14.1.el7a |
Expand...http://www.securityfocus.com/bid/105119
http://www.securitytracker.com/id/1041529
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2019:0415
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/errata/RHSA-2019:3217
https://access.redhat.com/errata/RHSA-2019:3967
https://access.redhat.com/security/cve/CVE-2018-10902
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10902
https://git.kernel.org/linus/39675f7a7c7e7702f7d5341f1e0d01db746543a0 (4.18-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39675f7a7c7e7702f7d5341f1e0d01db746543a0
https://linux.oracle.com/cve/CVE-2018-10902.html
https://linux.oracle.com/errata/ELSA-2019-4316.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
https://ubuntu.com/security/notices/USN-3776-1
https://ubuntu.com/security/notices/USN-3776-2
https://ubuntu.com/security/notices/USN-3847-1
https://ubuntu.com/security/notices/USN-3847-2
https://ubuntu.com/security/notices/USN-3847-3
https://ubuntu.com/security/notices/USN-3849-1
https://ubuntu.com/security/notices/USN-3849-2
https://usn.ubuntu.com/3776-1/
https://usn.ubuntu.com/3776-2/
https://usn.ubuntu.com/3847-1/
https://usn.ubuntu.com/3847-2/
https://usn.ubuntu.com/3847-3/
https://usn.ubuntu.com/3849-1/
https://usn.ubuntu.com/3849-2/
https://www.debian.org/security/2018/dsa-4308
| +| kernel-headers | CVE-2018-13405 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
http://openwall.com/lists/oss-security/2018/07/13/2
http://www.securityfocus.com/bid/106503
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2019:0717
https://access.redhat.com/errata/RHSA-2019:2476
https://access.redhat.com/errata/RHSA-2019:2566
https://access.redhat.com/errata/RHSA-2019:2696
https://access.redhat.com/errata/RHSA-2019:2730
https://access.redhat.com/errata/RHSA-2019:4159
https://access.redhat.com/errata/RHSA-2019:4164
https://access.redhat.com/security/cve/CVE-2018-13405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405
https://git.kernel.org/linux/0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=0b3369840cd61c23e2b9241093737b4c395cb406
https://github.com/torvalds/linux/commit/0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
https://linux.oracle.com/cve/CVE-2018-13405.html
https://linux.oracle.com/errata/ELSA-2019-0717.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRBNBX73SAFKQWBOX76SLMWPTKJPVGEJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTKKIAUMR5FAYLZ7HLEPOXMKAAE3BYBQ/
https://support.f5.com/csp/article/K00854051
https://twitter.com/grsecurity/status/1015082951204327425
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://ubuntu.com/security/notices/USN-3753-1
https://ubuntu.com/security/notices/USN-3753-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
https://usn.ubuntu.com/3753-1/
https://usn.ubuntu.com/3753-2/
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2018/dsa-4266
https://www.exploit-db.com/exploits/45033/
https://www.halfdog.net/Security/2015/SetgidDirectoryPrivilegeEscalation/
| +| kernel-headers | CVE-2018-14619 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://www.securityfocus.com/bid/105200
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2018-14619
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14619
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b32a7dc8aef1882fbf983eb354837488cc9d54dc
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0013
| +| kernel-headers | CVE-2018-14641 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2018-14641
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14641
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d407b071dc369c26a38398326ee2be53651cfe4
https://seclists.org/oss-sec/2018/q3/248
| +| kernel-headers | CVE-2018-16884 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.26.1.el7a |
Expand...http://www.securityfocus.com/bid/106253
https://access.redhat.com/errata/RHSA-2019:1873
https://access.redhat.com/errata/RHSA-2019:1891
https://access.redhat.com/errata/RHSA-2019:2696
https://access.redhat.com/errata/RHSA-2019:2730
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/errata/RHSA-2020:0204
https://access.redhat.com/security/cve/CVE-2018-16884
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16884
https://linux.oracle.com/cve/CVE-2018-16884.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
https://lore.kernel.org/linux-nfs/1b3282c0-12ce-0e2c-0fa9-63418a3f2a80@virtuozzo.com/T/#m6b9e4d7efcc6b3564f9d53c051caf2370ae8e70a
https://patchwork.kernel.org/cover/10733767/
https://patchwork.kernel.org/patch/10733769/
https://support.f5.com/csp/article/K21430012
https://ubuntu.com/security/notices/USN-3932-1
https://ubuntu.com/security/notices/USN-3932-2
https://ubuntu.com/security/notices/USN-3980-1
https://ubuntu.com/security/notices/USN-3980-2
https://ubuntu.com/security/notices/USN-3981-1
https://ubuntu.com/security/notices/USN-3981-2
https://usn.ubuntu.com/3932-1/
https://usn.ubuntu.com/3932-2/
https://usn.ubuntu.com/3980-1/
https://usn.ubuntu.com/3980-2/
https://usn.ubuntu.com/3981-1/
https://usn.ubuntu.com/3981-2/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2018-17182 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.2.2.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
http://www.securityfocus.com/bid/105417
http://www.securityfocus.com/bid/106503
http://www.securitytracker.com/id/1041748
https://access.redhat.com/errata/RHSA-2018:3656
https://access.redhat.com/security/cve/CVE-2018-17182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17182
https://github.com/torvalds/linux/commit/7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
https://googleprojectzero.blogspot.com/2018/09/a-cache-invalidation-bug-in-linux.html
https://linux.oracle.com/cve/CVE-2018-17182.html
https://linux.oracle.com/errata/ELSA-2018-4270.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
https://security.netapp.com/advisory/ntap-20190204-0001/
https://ubuntu.com/security/notices/USN-3776-1
https://ubuntu.com/security/notices/USN-3776-2
https://ubuntu.com/security/notices/USN-3777-1
https://ubuntu.com/security/notices/USN-3777-2
https://ubuntu.com/security/notices/USN-3777-3
https://usn.ubuntu.com/3776-1/
https://usn.ubuntu.com/3776-2/
https://usn.ubuntu.com/3777-1/
https://usn.ubuntu.com/3777-2/
https://usn.ubuntu.com/3777-3/
https://www.debian.org/security/2018/dsa-4308
https://www.exploit-db.com/exploits/45497/
https://www.openwall.com/lists/oss-security/2018/09/18/4
| +| kernel-headers | CVE-2018-18021 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.2.2.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f93459d689d990b3ecfbe782fec89b97d3279
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d26c25a9d19b5976b319af528886f89cf455692d
http://www.securityfocus.com/bid/105550
https://access.redhat.com/errata/RHSA-2018:3656
https://access.redhat.com/security/cve/CVE-2018-18021
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18021
https://git.kernel.org/linus/2a3f93459d689d990b3ecfbe782fec89b97d3279
https://git.kernel.org/linus/d26c25a9d19b5976b319af528886f89cf455692d
https://github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279
https://github.com/torvalds/linux/commit/d26c25a9d19b5976b319af528886f89cf455692d
https://linux.oracle.com/cve/CVE-2018-18021.html
https://linux.oracle.com/errata/ELSA-2018-4270.html
https://ubuntu.com/security/notices/USN-3821-1
https://ubuntu.com/security/notices/USN-3821-2
https://ubuntu.com/security/notices/USN-3931-1
https://ubuntu.com/security/notices/USN-3931-2
https://usn.ubuntu.com/3821-1/
https://usn.ubuntu.com/3821-2/
https://usn.ubuntu.com/3931-1/
https://usn.ubuntu.com/3931-2/
https://www.debian.org/security/2018/dsa-4313
https://www.openwall.com/lists/oss-security/2018/10/02/2
| +| kernel-headers | CVE-2018-18559 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.17.1.el7a |
Expand...https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2019:0163
https://access.redhat.com/errata/RHSA-2019:0188
https://access.redhat.com/errata/RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1190
https://access.redhat.com/errata/RHSA-2019:3967
https://access.redhat.com/errata/RHSA-2019:4159
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/security/cve/CVE-2018-18559
https://blogs.securiteam.com/index.php/archives/3731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18559
https://linux.oracle.com/cve/CVE-2018-18559.html
https://linux.oracle.com/errata/ELSA-2019-4575.html
| +| kernel-headers | CVE-2018-20856 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.14.1.el7a |
Expand...http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
https://access.redhat.com/errata/RHSA-2019:3055
https://access.redhat.com/errata/RHSA-2019:3076
https://access.redhat.com/errata/RHSA-2019:3089
https://access.redhat.com/errata/RHSA-2019:3217
https://access.redhat.com/errata/RHSA-2020:0100
https://access.redhat.com/errata/RHSA-2020:0103
https://access.redhat.com/errata/RHSA-2020:0543
https://access.redhat.com/errata/RHSA-2020:0664
https://access.redhat.com/errata/RHSA-2020:0698
https://access.redhat.com/security/cve/CVE-2018-20856
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54648cf1ec2d7f4b6a71767799c45676a138ca24
https://github.com/torvalds/linux/commit/54648cf1ec2d7f4b6a71767799c45676a138ca24
https://linux.oracle.com/cve/CVE-2018-20856.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Aug/26
https://security.netapp.com/advisory/ntap-20190905-0002/
https://support.f5.com/csp/article/K14673240?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4116-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4116-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4497
| +| kernel-headers | CVE-2018-20976 | HIGH | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/errata/RHSA-2020:0178
https://access.redhat.com/errata/RHSA-2020:0543
https://access.redhat.com/errata/RHSA-2020:0592
https://access.redhat.com/errata/RHSA-2020:0609
https://access.redhat.com/errata/RHSA-2020:0661
https://access.redhat.com/security/cve/CVE-2018-20976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20976
https://git.kernel.org/linus/c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20190905-0002/
https://support.f5.com/csp/article/K10269585?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4144-1
https://ubuntu.com/security/notices/USN-4145-1
https://usn.ubuntu.com/4144-1/
https://usn.ubuntu.com/4145-1/
| +| kernel-headers | CVE-2018-3639 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html
http://support.lenovo.com/us/en/solutions/LEN-22133
http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html
http://www.openwall.com/lists/oss-security/2020/06/10/1
http://www.openwall.com/lists/oss-security/2020/06/10/2
http://www.openwall.com/lists/oss-security/2020/06/10/5
http://www.securityfocus.com/bid/104232
http://www.securitytracker.com/id/1040949
http://www.securitytracker.com/id/1042004
http://xenbits.xen.org/xsa/advisory-263.html
https://access.redhat.com/errata/RHSA-2018:1629
https://access.redhat.com/errata/RHSA-2018:1630
https://access.redhat.com/errata/RHSA-2018:1632
https://access.redhat.com/errata/RHSA-2018:1633
https://access.redhat.com/errata/RHSA-2018:1635
https://access.redhat.com/errata/RHSA-2018:1636
https://access.redhat.com/errata/RHSA-2018:1637
https://access.redhat.com/errata/RHSA-2018:1638
https://access.redhat.com/errata/RHSA-2018:1639
https://access.redhat.com/errata/RHSA-2018:1640
https://access.redhat.com/errata/RHSA-2018:1641
https://access.redhat.com/errata/RHSA-2018:1642
https://access.redhat.com/errata/RHSA-2018:1643
https://access.redhat.com/errata/RHSA-2018:1644
https://access.redhat.com/errata/RHSA-2018:1645
https://access.redhat.com/errata/RHSA-2018:1646
https://access.redhat.com/errata/RHSA-2018:1647
https://access.redhat.com/errata/RHSA-2018:1648
https://access.redhat.com/errata/RHSA-2018:1649
https://access.redhat.com/errata/RHSA-2018:1650
https://access.redhat.com/errata/RHSA-2018:1651
https://access.redhat.com/errata/RHSA-2018:1652
https://access.redhat.com/errata/RHSA-2018:1653
https://access.redhat.com/errata/RHSA-2018:1654
https://access.redhat.com/errata/RHSA-2018:1655
https://access.redhat.com/errata/RHSA-2018:1656
https://access.redhat.com/errata/RHSA-2018:1657
https://access.redhat.com/errata/RHSA-2018:1658
https://access.redhat.com/errata/RHSA-2018:1659
https://access.redhat.com/errata/RHSA-2018:1660
https://access.redhat.com/errata/RHSA-2018:1661
https://access.redhat.com/errata/RHSA-2018:1662
https://access.redhat.com/errata/RHSA-2018:1663
https://access.redhat.com/errata/RHSA-2018:1664
https://access.redhat.com/errata/RHSA-2018:1665
https://access.redhat.com/errata/RHSA-2018:1666
https://access.redhat.com/errata/RHSA-2018:1667
https://access.redhat.com/errata/RHSA-2018:1668
https://access.redhat.com/errata/RHSA-2018:1669
https://access.redhat.com/errata/RHSA-2018:1674
https://access.redhat.com/errata/RHSA-2018:1675
https://access.redhat.com/errata/RHSA-2018:1676
https://access.redhat.com/errata/RHSA-2018:1686
https://access.redhat.com/errata/RHSA-2018:1688
https://access.redhat.com/errata/RHSA-2018:1689
https://access.redhat.com/errata/RHSA-2018:1690
https://access.redhat.com/errata/RHSA-2018:1696
https://access.redhat.com/errata/RHSA-2018:1710
https://access.redhat.com/errata/RHSA-2018:1711
https://access.redhat.com/errata/RHSA-2018:1737
https://access.redhat.com/errata/RHSA-2018:1738
https://access.redhat.com/errata/RHSA-2018:1826
https://access.redhat.com/errata/RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2018:1965
https://access.redhat.com/errata/RHSA-2018:1967
https://access.redhat.com/errata/RHSA-2018:1997
https://access.redhat.com/errata/RHSA-2018:2001
https://access.redhat.com/errata/RHSA-2018:2003
https://access.redhat.com/errata/RHSA-2018:2006
https://access.redhat.com/errata/RHSA-2018:2060
https://access.redhat.com/errata/RHSA-2018:2161
https://access.redhat.com/errata/RHSA-2018:2162
https://access.redhat.com/errata/RHSA-2018:2164
https://access.redhat.com/errata/RHSA-2018:2171
https://access.redhat.com/errata/RHSA-2018:2172
https://access.redhat.com/errata/RHSA-2018:2216
https://access.redhat.com/errata/RHSA-2018:2228
https://access.redhat.com/errata/RHSA-2018:2246
https://access.redhat.com/errata/RHSA-2018:2250
https://access.redhat.com/errata/RHSA-2018:2258
https://access.redhat.com/errata/RHSA-2018:2289
https://access.redhat.com/errata/RHSA-2018:2309
https://access.redhat.com/errata/RHSA-2018:2328
https://access.redhat.com/errata/RHSA-2018:2363
https://access.redhat.com/errata/RHSA-2018:2364
https://access.redhat.com/errata/RHSA-2018:2387
https://access.redhat.com/errata/RHSA-2018:2394
https://access.redhat.com/errata/RHSA-2018:2396
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3396
https://access.redhat.com/errata/RHSA-2018:3397
https://access.redhat.com/errata/RHSA-2018:3398
https://access.redhat.com/errata/RHSA-2018:3399
https://access.redhat.com/errata/RHSA-2018:3400
https://access.redhat.com/errata/RHSA-2018:3401
https://access.redhat.com/errata/RHSA-2018:3402
https://access.redhat.com/errata/RHSA-2018:3407
https://access.redhat.com/errata/RHSA-2018:3423
https://access.redhat.com/errata/RHSA-2018:3424
https://access.redhat.com/errata/RHSA-2018:3425
https://access.redhat.com/errata/RHSA-2019:0148
https://access.redhat.com/errata/RHSA-2019:1046
https://access.redhat.com/security/cve/CVE-2018-3639
https://access.redhat.com/security/vulnerabilities/ssbd
https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-3639.html
https://linux.oracle.com/errata/ELSA-2019-4585.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://nvidia.custhelp.com/app/answers/detail/a_id/4787
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004
https://seclists.org/bugtraq/2019/Jun/36
https://security.netapp.com/advisory/ntap-20180521-0001/
https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf
https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf
https://support.citrix.com/article/CTX235225
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us
https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel
https://ubuntu.com/security/notices/USN-3651-1
https://ubuntu.com/security/notices/USN-3652-1
https://ubuntu.com/security/notices/USN-3653-1
https://ubuntu.com/security/notices/USN-3653-2
https://ubuntu.com/security/notices/USN-3654-1
https://ubuntu.com/security/notices/USN-3654-2
https://ubuntu.com/security/notices/USN-3655-1
https://ubuntu.com/security/notices/USN-3655-2
https://ubuntu.com/security/notices/USN-3679-1
https://ubuntu.com/security/notices/USN-3680-1
https://ubuntu.com/security/notices/USN-3756-1
https://ubuntu.com/security/notices/USN-3777-3
https://usn.ubuntu.com/3651-1/
https://usn.ubuntu.com/3652-1/
https://usn.ubuntu.com/3653-1/
https://usn.ubuntu.com/3653-2/
https://usn.ubuntu.com/3654-1/
https://usn.ubuntu.com/3654-2/
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
https://usn.ubuntu.com/3679-1/
https://usn.ubuntu.com/3680-1/
https://usn.ubuntu.com/3756-1/
https://usn.ubuntu.com/3777-3/
https://www.debian.org/security/2018/dsa-4210
https://www.debian.org/security/2018/dsa-4273
https://www.exploit-db.com/exploits/44695/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
https://www.kb.cert.org/vuls/id/180049
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.synology.com/support/security/Synology_SA_18_23
https://www.us-cert.gov/ncas/alerts/TA18-141A
| +| kernel-headers | CVE-2018-3693 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.17.1.el7a |
Expand...https://01.org/security/advisories/intel-oss-10002
https://access.redhat.com/errata/RHSA-2018:2384
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:2395
https://access.redhat.com/errata/RHSA-2019:1946
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/security/cve/CVE-2018-3693
https://access.redhat.com/solutions/3523601
https://cdrdv2.intel.com/v1/dl/getContent/685359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3693
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-3693.html
https://linux.oracle.com/errata/ELSA-2018-2390.html
https://people.csail.mit.edu/vlk/spectre11.pdf
https://security.netapp.com/advisory/ntap-20180823-0001/
https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BCBS
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
| +| kernel-headers | CVE-2018-5390 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
http://www.securityfocus.com/bid/104976
http://www.securitytracker.com/id/1041424
http://www.securitytracker.com/id/1041434
https://access.redhat.com/articles/3553061
https://access.redhat.com/errata/RHSA-2018:2384
https://access.redhat.com/errata/RHSA-2018:2395
https://access.redhat.com/errata/RHSA-2018:2402
https://access.redhat.com/errata/RHSA-2018:2403
https://access.redhat.com/errata/RHSA-2018:2645
https://access.redhat.com/errata/RHSA-2018:2776
https://access.redhat.com/errata/RHSA-2018:2785
https://access.redhat.com/errata/RHSA-2018:2789
https://access.redhat.com/errata/RHSA-2018:2790
https://access.redhat.com/errata/RHSA-2018:2791
https://access.redhat.com/errata/RHSA-2018:2924
https://access.redhat.com/errata/RHSA-2018:2933
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2018-5390
https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5390
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-5390.html
https://linux.oracle.com/errata/ELSA-2018-4216.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
https://security.netapp.com/advisory/ntap-20180815-0003/
https://support.f5.com/csp/article/K95343321
https://support.f5.com/csp/article/K95343321?utm_source=f5support&utm_medium=RSS
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp
https://ubuntu.com/security/notices/USN-3732-1
https://ubuntu.com/security/notices/USN-3732-2
https://ubuntu.com/security/notices/USN-3741-1
https://ubuntu.com/security/notices/USN-3741-2
https://ubuntu.com/security/notices/USN-3742-1
https://ubuntu.com/security/notices/USN-3742-2
https://ubuntu.com/security/notices/USN-3763-1
https://usn.ubuntu.com/3732-1/
https://usn.ubuntu.com/3732-2/
https://usn.ubuntu.com/3741-1/
https://usn.ubuntu.com/3741-2/
https://usn.ubuntu.com/3742-1/
https://usn.ubuntu.com/3742-2/
https://usn.ubuntu.com/3763-1/
https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack
https://www.debian.org/security/2018/dsa-4266
https://www.kb.cert.org/vuls/id/962459
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.spinics.net/lists/netdev/msg514742.html
https://www.synology.com/support/security/Synology_SA_18_41
| +| kernel-headers | CVE-2018-5391 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-linux-en
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
http://www.securityfocus.com/bid/105108
http://www.securitytracker.com/id/1041476
http://www.securitytracker.com/id/1041637
https://access.redhat.com/articles/3553061
https://access.redhat.com/errata/RHSA-2018:2785
https://access.redhat.com/errata/RHSA-2018:2791
https://access.redhat.com/errata/RHSA-2018:2846
https://access.redhat.com/errata/RHSA-2018:2924
https://access.redhat.com/errata/RHSA-2018:2925
https://access.redhat.com/errata/RHSA-2018:2933
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2018:3459
https://access.redhat.com/errata/RHSA-2018:3540
https://access.redhat.com/errata/RHSA-2018:3586
https://access.redhat.com/errata/RHSA-2018:3590
https://access.redhat.com/security/cve/CVE-2018-5391
https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=c30f1fc041b74ecdb072dd44f858750414b8b19f
https://linux.oracle.com/cve/CVE-2018-5391.html
https://linux.oracle.com/errata/ELSA-2018-4196.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://security.netapp.com/advisory/ntap-20181003-0002/
https://support.f5.com/csp/article/K74374841?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3740-1
https://ubuntu.com/security/notices/USN-3740-2
https://ubuntu.com/security/notices/USN-3741-1
https://ubuntu.com/security/notices/USN-3741-2
https://ubuntu.com/security/notices/USN-3742-1
https://ubuntu.com/security/notices/USN-3742-2
https://usn.ubuntu.com/3740-1/
https://usn.ubuntu.com/3740-2/
https://usn.ubuntu.com/3741-1/
https://usn.ubuntu.com/3741-2/
https://usn.ubuntu.com/3742-1/
https://usn.ubuntu.com/3742-2/
https://www.debian.org/security/2018/dsa-4272
https://www.kb.cert.org/vuls/id/641765
| +| kernel-headers | CVE-2018-8781 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-8781
https://bugzilla.redhat.com/show_bug.cgi?id=1571062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
https://linux.oracle.com/cve/CVE-2018-8781.html
https://linux.oracle.com/errata/ELSA-2018-4164.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://patchwork.freedesktop.org/patch/211845/
https://research.checkpoint.com/mmap-vulnerabilities-linux-kernel/
https://ubuntu.com/security/notices/USN-3654-1
https://ubuntu.com/security/notices/USN-3654-2
https://ubuntu.com/security/notices/USN-3656-1
https://ubuntu.com/security/notices/USN-3674-1
https://ubuntu.com/security/notices/USN-3674-2
https://ubuntu.com/security/notices/USN-3677-1
https://ubuntu.com/security/notices/USN-3677-2
https://usn.ubuntu.com/3654-1/
https://usn.ubuntu.com/3654-2/
https://usn.ubuntu.com/3656-1/
https://usn.ubuntu.com/3674-1/
https://usn.ubuntu.com/3674-2/
https://usn.ubuntu.com/3677-1/
https://usn.ubuntu.com/3677-2/
https://www.debian.org/security/2018/dsa-4187
https://www.debian.org/security/2018/dsa-4188
| +| kernel-headers | CVE-2019-10126 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.17.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://www.securityfocus.com/bid/108817
https://access.redhat.com/errata/RHSA-2019:3055
https://access.redhat.com/errata/RHSA-2019:3076
https://access.redhat.com/errata/RHSA-2019:3089
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/errata/RHSA-2020:0204
https://access.redhat.com/security/cve/CVE-2019-10126
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126
https://linux.oracle.com/cve/CVE-2019-10126.html
https://linux.oracle.com/errata/ELSA-2019-3517.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
https://lore.kernel.org/linux-wireless/20190531131841.7552-1-tiwai@suse.de
https://seclists.org/bugtraq/2019/Jul/33
https://seclists.org/bugtraq/2019/Jun/26
https://security.netapp.com/advisory/ntap-20190710-0002/
https://support.f5.com/csp/article/K95593121
https://ubuntu.com/security/notices/USN-4093-1
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4095-1
https://ubuntu.com/security/notices/USN-4095-2
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4093-1/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4095-1/
https://usn.ubuntu.com/4095-2/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4465
| +| kernel-headers | CVE-2019-11477 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.8.2.el7a |
Expand...http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en
http://www.openwall.com/lists/oss-security/2019/06/20/3
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
http://www.openwall.com/lists/oss-security/2019/10/24/1
http://www.openwall.com/lists/oss-security/2019/10/29/3
http://www.vmware.com/security/advisories/VMSA-2019-0010.html
https://access.redhat.com/errata/RHSA-2019:1594
https://access.redhat.com/errata/RHSA-2019:1602
https://access.redhat.com/errata/RHSA-2019:1699
https://access.redhat.com/security/cve/CVE-2019-11477
https://access.redhat.com/security/vulnerabilities/tcpsack
https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
https://kc.mcafee.com/corporate/index?page=content&id=SB10287
https://linux.oracle.com/cve/CVE-2019-11477.html
https://linux.oracle.com/errata/ELSA-2019-4689.html
https://patchwork.ozlabs.org/project/netdev/list/?series=114310
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006
https://security.netapp.com/advisory/ntap-20190625-0001/
https://support.f5.com/csp/article/K78234183
https://ubuntu.com/security/notices/USN-4017-1
https://ubuntu.com/security/notices/USN-4017-2
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
https://www.kb.cert.org/vuls/id/905115
https://www.openwall.com/lists/oss-security/2019/06/17/5
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.synology.com/security/advisory/Synology_SA_19_28
https://www.us-cert.gov/ics/advisories/icsa-19-253-03
| +| kernel-headers | CVE-2019-11487 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.17.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.openwall.com/lists/oss-security/2019/04/29/1
http://www.securityfocus.com/bid/108054
https://access.redhat.com/errata/RHSA-2019:2703
https://access.redhat.com/errata/RHSA-2019:2741
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/security/cve/CVE-2019-11487
https://bugs.chromium.org/p/project-zero/issues/detail?id=1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11487
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=15fab63e1e57be9fdb5eec1bbc5916e9825e9acb
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6b3a707736301c2128ca85ce85fb13f60b5e350a
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=88b1a17dfc3ed7728316478fae0f5ad508f50397
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8fde12ca79aff9b5ba951fce1a2641901b8d8e64
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f958d7b528b1b40c44cfda5eabe2d82760d868c3
https://github.com/torvalds/linux/commit/15fab63e1e57be9fdb5eec1bbc5916e9825e9acb
https://github.com/torvalds/linux/commit/6b3a707736301c2128ca85ce85fb13f60b5e350a
https://github.com/torvalds/linux/commit/88b1a17dfc3ed7728316478fae0f5ad508f50397
https://github.com/torvalds/linux/commit/8fde12ca79aff9b5ba951fce1a2641901b8d8e64
https://github.com/torvalds/linux/commit/f958d7b528b1b40c44cfda5eabe2d82760d868c3
https://linux.oracle.com/cve/CVE-2019-11487.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lwn.net/Articles/786044/
https://security.netapp.com/advisory/ntap-20190517-0005/
https://support.f5.com/csp/article/K14255532
https://ubuntu.com/security/notices/USN-4069-1
https://ubuntu.com/security/notices/USN-4069-2
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4145-1
https://usn.ubuntu.com/4069-1/
https://usn.ubuntu.com/4069-2/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4145-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-13272 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.12.1.el7a |
Expand...http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html
http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html
http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html
http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html
https://access.redhat.com/errata/RHSA-2019:2405
https://access.redhat.com/errata/RHSA-2019:2411
https://access.redhat.com/errata/RHSA-2019:2809
https://access.redhat.com/security/cve/CVE-2019-13272
https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
https://bugzilla.redhat.com/show_bug.cgi?id=1730895
https://bugzilla.suse.com/show_bug.cgi?id=1140671
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13272
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee
https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee
https://linux.oracle.com/cve/CVE-2019-13272.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/
https://seclists.org/bugtraq/2019/Jul/30
https://seclists.org/bugtraq/2019/Jul/33
https://security.netapp.com/advisory/ntap-20190806-0001/
https://support.f5.com/csp/article/K91025336
https://support.f5.com/csp/article/K91025336?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4093-1
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4095-1
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4093-1/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4095-1/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4484
| +| kernel-headers | CVE-2019-14816 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.17.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/08/28/1
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/errata/RHSA-2020:0204
https://access.redhat.com/errata/RHSA-2020:0328
https://access.redhat.com/errata/RHSA-2020:0339
https://access.redhat.com/errata/RHSA-2020:0374
https://access.redhat.com/errata/RHSA-2020:0375
https://access.redhat.com/errata/RHSA-2020:0653
https://access.redhat.com/errata/RHSA-2020:0661
https://access.redhat.com/errata/RHSA-2020:0664
https://access.redhat.com/security/cve/CVE-2019-14816
https://access.redhat.com/security/cve/cve-2019-14816
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a
https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3
https://linux.oracle.com/cve/CVE-2019-14816.html
https://linux.oracle.com/errata/ELSA-2020-5676.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
https://lore.kernel.org/linux-wireless/20190828020751.13625-1-huangwenabc@gmail.com/
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20191031-0005/
https://ubuntu.com/security/notices/USN-4157-1
https://ubuntu.com/security/notices/USN-4157-2
https://ubuntu.com/security/notices/USN-4162-1
https://ubuntu.com/security/notices/USN-4162-2
https://ubuntu.com/security/notices/USN-4163-1
https://ubuntu.com/security/notices/USN-4163-2
https://usn.ubuntu.com/4157-1/
https://usn.ubuntu.com/4157-2/
https://usn.ubuntu.com/4162-1/
https://usn.ubuntu.com/4162-2/
https://usn.ubuntu.com/4163-1/
https://usn.ubuntu.com/4163-2/
https://www.openwall.com/lists/oss-security/2019/08/28/1
| +| kernel-headers | CVE-2019-14821 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.16.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/09/20/1
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/errata/RHSA-2019:3978
https://access.redhat.com/errata/RHSA-2019:3979
https://access.redhat.com/errata/RHSA-2019:4154
https://access.redhat.com/errata/RHSA-2019:4256
https://access.redhat.com/errata/RHSA-2020:0027
https://access.redhat.com/errata/RHSA-2020:0204
https://access.redhat.com/security/cve/CVE-2019-14821
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821
https://linux.oracle.com/cve/CVE-2019-14821.html
https://linux.oracle.com/errata/ELSA-2019-4820.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRZQQQANZWQMPILZV7OTS3RGGRLLE2Q7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/
https://seclists.org/bugtraq/2019/Nov/11
https://seclists.org/bugtraq/2019/Sep/41
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4157-1
https://ubuntu.com/security/notices/USN-4157-2
https://ubuntu.com/security/notices/USN-4162-1
https://ubuntu.com/security/notices/USN-4162-2
https://ubuntu.com/security/notices/USN-4163-1
https://ubuntu.com/security/notices/USN-4163-2
https://usn.ubuntu.com/4157-1/
https://usn.ubuntu.com/4157-2/
https://usn.ubuntu.com/4162-1/
https://usn.ubuntu.com/4162-2/
https://usn.ubuntu.com/4163-1/
https://usn.ubuntu.com/4163-2/
https://www.debian.org/security/2019/dsa-4531
https://www.openwall.com/lists/oss-security/2019/09/20/1
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| kernel-headers | CVE-2019-14835 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.13.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en
http://www.openwall.com/lists/oss-security/2019/09/24/1
http://www.openwall.com/lists/oss-security/2019/10/03/1
http://www.openwall.com/lists/oss-security/2019/10/09/3
http://www.openwall.com/lists/oss-security/2019/10/09/7
https://access.redhat.com/errata/RHBA-2019:2824
https://access.redhat.com/errata/RHSA-2019:2827
https://access.redhat.com/errata/RHSA-2019:2828
https://access.redhat.com/errata/RHSA-2019:2829
https://access.redhat.com/errata/RHSA-2019:2830
https://access.redhat.com/errata/RHSA-2019:2854
https://access.redhat.com/errata/RHSA-2019:2862
https://access.redhat.com/errata/RHSA-2019:2863
https://access.redhat.com/errata/RHSA-2019:2864
https://access.redhat.com/errata/RHSA-2019:2865
https://access.redhat.com/errata/RHSA-2019:2866
https://access.redhat.com/errata/RHSA-2019:2867
https://access.redhat.com/errata/RHSA-2019:2869
https://access.redhat.com/errata/RHSA-2019:2889
https://access.redhat.com/errata/RHSA-2019:2899
https://access.redhat.com/errata/RHSA-2019:2900
https://access.redhat.com/errata/RHSA-2019:2901
https://access.redhat.com/errata/RHSA-2019:2924
https://access.redhat.com/security/cve/CVE-2019-14835
https://access.redhat.com/security/vulnerabilities/kernel-vhost
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835
https://linux.oracle.com/cve/CVE-2019-14835.html
https://linux.oracle.com/errata/ELSA-2019-4850.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/
https://seclists.org/bugtraq/2019/Nov/11
https://seclists.org/bugtraq/2019/Sep/41
https://security.netapp.com/advisory/ntap-20191031-0005/
https://ubuntu.com/security/notices/USN-4135-1
https://ubuntu.com/security/notices/USN-4135-2
https://usn.ubuntu.com/4135-1/
https://usn.ubuntu.com/4135-2/
https://www.debian.org/security/2019/dsa-4531
https://www.openwall.com/lists/oss-security/2019/09/17/1
| +| kernel-headers | CVE-2019-14895 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.19.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
https://access.redhat.com/errata/RHSA-2020:0328
https://access.redhat.com/errata/RHSA-2020:0339
https://access.redhat.com/errata/RHSA-2020:0374
https://access.redhat.com/errata/RHSA-2020:0375
https://access.redhat.com/errata/RHSA-2020:0543
https://access.redhat.com/errata/RHSA-2020:0592
https://access.redhat.com/errata/RHSA-2020:0609
https://access.redhat.com/errata/RHSA-2020:0653
https://access.redhat.com/errata/RHSA-2020:0661
https://access.redhat.com/errata/RHSA-2020:0664
https://access.redhat.com/security/cve/CVE-2019-14895
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14895
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895
https://linux.oracle.com/cve/CVE-2019-14895.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/
https://seclists.org/oss-sec/2019/q4/95
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4228-1
https://ubuntu.com/security/notices/USN-4228-2
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4228-1/
https://usn.ubuntu.com/4228-2/
https://www.openwall.com/lists/oss-security/2019/11/22/2
| +| kernel-headers | CVE-2019-14901 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.19.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
https://access.redhat.com/errata/RHSA-2020:0204
https://access.redhat.com/errata/RHSA-2020:0328
https://access.redhat.com/errata/RHSA-2020:0339
https://access.redhat.com/errata/RHSA-2020:0374
https://access.redhat.com/errata/RHSA-2020:0375
https://access.redhat.com/security/cve/CVE-2019-14901
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14901
https://linux.oracle.com/cve/CVE-2019-14901.html
https://linux.oracle.com/errata/ELSA-2020-5569.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/
https://lore.kernel.org/linux-wireless/20191129101054.2756-1-wangqize888888888@gmail.com/
https://patchwork.kernel.org/patch/11257535/
https://seclists.org/oss-sec/2019/q4/96
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4228-1
https://ubuntu.com/security/notices/USN-4228-2
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4228-1/
https://usn.ubuntu.com/4228-2/
| +| kernel-headers | CVE-2019-17133 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.17.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/errata/RHSA-2020:0374
https://access.redhat.com/errata/RHSA-2020:0375
https://access.redhat.com/errata/RHSA-2020:0543
https://access.redhat.com/errata/RHSA-2020:0592
https://access.redhat.com/errata/RHSA-2020:0609
https://access.redhat.com/errata/RHSA-2020:0653
https://access.redhat.com/errata/RHSA-2020:0661
https://access.redhat.com/errata/RHSA-2020:0664
https://access.redhat.com/errata/RHSA-2020:0790
https://access.redhat.com/security/cve/CVE-2019-17133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133
https://linux.oracle.com/cve/CVE-2019-17133.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://marc.info/?l=linux-wireless&m=157018270915487&w=2
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20191031-0005/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4210-1
https://ubuntu.com/security/notices/USN-4211-1
https://ubuntu.com/security/notices/USN-4211-2
https://ubuntu.com/security/notices/USN-4226-1
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4210-1/
https://usn.ubuntu.com/4211-1/
https://usn.ubuntu.com/4211-2/
https://usn.ubuntu.com/4226-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-17666 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.18.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://access.redhat.com/errata/RHSA-2020:0328
https://access.redhat.com/errata/RHSA-2020:0339
https://access.redhat.com/errata/RHSA-2020:0543
https://access.redhat.com/errata/RHSA-2020:0661
https://access.redhat.com/errata/RHSA-2020:0740
https://access.redhat.com/security/cve/CVE-2019-17666
https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c55dedb795be8ec0cf488f98c03a1c2176f7fb1
https://linux.oracle.com/cve/CVE-2019-17666.html
https://linux.oracle.com/errata/ELSA-2020-5535.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRBP4O6D2SQ2NHCRHTJONGCZLWOIV5MN/
https://lkml.org/lkml/2019/10/16/1226
https://lore.kernel.org/lkml/20191016205716.2843-1-labbott@redhat.com/
https://security.netapp.com/advisory/ntap-20191031-0005/
https://twitter.com/nicowaisman/status/1184864519316758535
https://ubuntu.com/security/notices/USN-4183-1
https://ubuntu.com/security/notices/USN-4184-1
https://ubuntu.com/security/notices/USN-4185-1
https://ubuntu.com/security/notices/USN-4186-1
https://ubuntu.com/security/notices/USN-4186-2
https://usn.ubuntu.com/4183-1/
https://usn.ubuntu.com/4184-1/
https://usn.ubuntu.com/4185-1/
https://usn.ubuntu.com/4186-1/
https://usn.ubuntu.com/4186-2/
| +| kernel-headers | CVE-2019-19768 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.21.2.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html
https://access.redhat.com/security/cve/CVE-2019-19768
https://bugzilla.kernel.org/show_bug.cgi?id=205711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
https://linux.oracle.com/cve/CVE-2019-19768.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lore.kernel.org/linux-block/20200206142812.25989-1-jack@suse.cz/
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
https://www.debian.org/security/2020/dsa-4698
| +| kernel-headers | CVE-2019-19807 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-19807
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19807
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e7af6307a8a54f0b873960b32b6a644f2d0fbd97
https://git.kernel.org/linus/e7af6307a8a54f0b873960b32b6a644f2d0fbd97
https://github.com/torvalds/linux/commit/e7af6307a8a54f0b873960b32b6a644f2d0fbd97
https://linux.oracle.com/cve/CVE-2019-19807.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| kernel-headers | CVE-2019-3846 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.17.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
https://access.redhat.com/errata/RHSA-2019:2703
https://access.redhat.com/errata/RHSA-2019:2741
https://access.redhat.com/errata/RHSA-2019:3055
https://access.redhat.com/errata/RHSA-2019:3076
https://access.redhat.com/errata/RHSA-2019:3089
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/security/cve/CVE-2019-3846
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846
https://linux.oracle.com/cve/CVE-2019-3846.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lore.kernel.org/linux-wireless/20190529125220.17066-1-tiwai@suse.de/
https://seclists.org/bugtraq/2019/Jul/33
https://seclists.org/bugtraq/2019/Jun/26
https://seclists.org/oss-sec/2019/q2/133
https://security.netapp.com/advisory/ntap-20190710-0002/
https://ubuntu.com/security/notices/USN-4093-1
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4095-1
https://ubuntu.com/security/notices/USN-4095-2
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4093-1/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4095-1/
https://usn.ubuntu.com/4095-2/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4465
| +| kernel-headers | CVE-2019-3900 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.10.1.el7a |
Expand...http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.securityfocus.com/bid/108076
https://access.redhat.com/errata/RHSA-2019:1973
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2019:3220
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/errata/RHSA-2019:3836
https://access.redhat.com/errata/RHSA-2019:3967
https://access.redhat.com/errata/RHSA-2019:4058
https://access.redhat.com/errata/RHSA-2020:0204
https://access.redhat.com/security/cve/CVE-2019-3900
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
https://linux.oracle.com/cve/CVE-2019-3900.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYTZH6QCNITK7353S6RCRT2PQHZSDPXD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3WXXM5URTZSR3RVEKO6MDXDFIKTZ5R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOFNJA5NNVXQ6AV6KGZB677JIVXAMJHT/
https://lore.kernel.org/lkml/1556177599-56248-1-git-send-email-jasowang@redhat.com/
https://lore.kernel.org/lkml/1558067392-11740-1-git-send-email-jasowang@redhat.com/ (revised patches)
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20190517-0005/
https://ubuntu.com/security/notices/USN-4114-1
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4116-1
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4114-1/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4116-1/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4497
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.spinics.net/lists/kernel/msg3111012.html
| +| kernel-headers | CVE-2019-5489 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.12.1.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-pagecache-en
http://www.securityfocus.com/bid/106478
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2019:2473
https://access.redhat.com/errata/RHSA-2019:2808
https://access.redhat.com/errata/RHSA-2019:2809
https://access.redhat.com/errata/RHSA-2019:2837
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/errata/RHSA-2019:3967
https://access.redhat.com/errata/RHSA-2019:4056
https://access.redhat.com/errata/RHSA-2019:4057
https://access.redhat.com/errata/RHSA-2019:4058
https://access.redhat.com/errata/RHSA-2019:4159
https://access.redhat.com/errata/RHSA-2019:4164
https://access.redhat.com/errata/RHSA-2019:4255
https://access.redhat.com/errata/RHSA-2020:0204
https://access.redhat.com/security/cve/CVE-2019-5489
https://arxiv.org/abs/1901.01161
https://arxiv.org/pdf/1901.01161.pdf
https://bugzilla.suse.com/show_bug.cgi?id=1120843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489
https://github.com/torvalds/linux/commit/574823bfab82d9d8fa47f422778043fbb4b4f50e
https://linux.oracle.com/cve/CVE-2019-5489.html
https://linux.oracle.com/errata/ELSA-2019-4541.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
https://lore.kernel.org/lkml/CAHk-=wg+C65FJHB=Jx1OvuJP4kvpWdw+5G=XOXB6X_KB2XuofA@mail.gmail.com/#t
https://lore.kernel.org/lkml/CAHk-=wiqbKEC5jUXr3ax+oUuiRrp=QMv_ZnUfO-SPv=UNJ-OTw@mail.gmail.com/
https://lore.kernel.org/lkml/nycvar.YFH.7.76.1901272335040.6626@cbobk.fhfr.pm/
https://seclists.org/bugtraq/2019/Jun/26
https://security.netapp.com/advisory/ntap-20190307-0001/
https://www.debian.org/security/2019/dsa-4465
https://www.openwall.com/lists/oss-security/2019/01/07/2
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/
| +| kernel-headers | CVE-2019-6974 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.12.1.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9
http://www.securityfocus.com/bid/107127
https://access.redhat.com/errata/RHBA-2019:0959
https://access.redhat.com/errata/RHSA-2019:0818
https://access.redhat.com/errata/RHSA-2019:0833
https://access.redhat.com/errata/RHSA-2019:2809
https://access.redhat.com/errata/RHSA-2019:3967
https://access.redhat.com/errata/RHSA-2020:0103
https://access.redhat.com/security/cve/CVE-2019-6974
https://bugs.chromium.org/p/project-zero/issues/detail?id=1765
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.99
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6974
https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9
https://linux.oracle.com/cve/CVE-2019-6974.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
https://support.f5.com/csp/article/K11186236
https://support.f5.com/csp/article/K11186236?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3930-1
https://ubuntu.com/security/notices/USN-3930-2
https://ubuntu.com/security/notices/USN-3931-1
https://ubuntu.com/security/notices/USN-3931-2
https://ubuntu.com/security/notices/USN-3932-1
https://ubuntu.com/security/notices/USN-3932-2
https://ubuntu.com/security/notices/USN-3933-1
https://ubuntu.com/security/notices/USN-3933-2
https://usn.ubuntu.com/3930-1/
https://usn.ubuntu.com/3930-2/
https://usn.ubuntu.com/3931-1/
https://usn.ubuntu.com/3931-2/
https://usn.ubuntu.com/3932-1/
https://usn.ubuntu.com/3932-2/
https://usn.ubuntu.com/3933-1/
https://usn.ubuntu.com/3933-2/
https://www.exploit-db.com/exploits/46388/
| +| kernel-headers | CVE-2019-8912 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.17.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html
http://patchwork.ozlabs.org/patch/1042902/
http://www.securityfocus.com/bid/107063
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/security/cve/CVE-2019-8912
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-8912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8912
https://linux.oracle.com/cve/CVE-2019-8912.html
https://linux.oracle.com/errata/ELSA-2019-4612.html
https://ubuntu.com/security/notices/USN-3930-1
https://ubuntu.com/security/notices/USN-3930-2
https://ubuntu.com/security/notices/USN-3931-1
https://ubuntu.com/security/notices/USN-3931-2
https://usn.ubuntu.com/3930-1/
https://usn.ubuntu.com/3930-2/
https://usn.ubuntu.com/3931-1/
https://usn.ubuntu.com/3931-2/
| +| kernel-headers | CVE-2019-9213 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.7.1.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a1d52994d440e21def1c2174932410b4f2a98a1
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html
http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html
http://www.securityfocus.com/bid/107296
https://access.redhat.com/errata/RHSA-2019:0831
https://access.redhat.com/errata/RHSA-2019:1479
https://access.redhat.com/errata/RHSA-2019:1480
https://access.redhat.com/security/cve/CVE-2019-9213
https://bugs.chromium.org/p/project-zero/issues/detail?id=1792
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.105
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.27
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.14
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9213
https://github.com/torvalds/linux/commit/0a1d52994d440e21def1c2174932410b4f2a98a1
https://linux.oracle.com/cve/CVE-2019-9213.html
https://linux.oracle.com/errata/ELSA-2019-4612.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
https://ubuntu.com/security/notices/USN-3930-1
https://ubuntu.com/security/notices/USN-3930-2
https://ubuntu.com/security/notices/USN-3931-1
https://ubuntu.com/security/notices/USN-3931-2
https://ubuntu.com/security/notices/USN-3932-1
https://ubuntu.com/security/notices/USN-3932-2
https://ubuntu.com/security/notices/USN-3933-1
https://ubuntu.com/security/notices/USN-3933-2
https://usn.ubuntu.com/3930-1/
https://usn.ubuntu.com/3930-2/
https://usn.ubuntu.com/3931-1/
https://usn.ubuntu.com/3931-2/
https://usn.ubuntu.com/3932-1/
https://usn.ubuntu.com/3932-2/
https://usn.ubuntu.com/3933-1/
https://usn.ubuntu.com/3933-2/
https://www.exploit-db.com/exploits/46502/
| +| kernel-headers | CVE-2019-9500 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.14.1.el7a |
Expand...https://access.redhat.com/security/cve/CVE-2019-9500
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html#cve-2019-9500-heap-buffer-overflow-in-brcmf-wowl-nd-results
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500
https://git.kernel.org/linus/1b5e2423164b3670e8bc9174e4762d297990deff
https://kb.cert.org/vuls/id/166939/
https://linux.oracle.com/cve/CVE-2019-9500.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://ubuntu.com/security/notices/USN-3979-1
https://ubuntu.com/security/notices/USN-3980-1
https://ubuntu.com/security/notices/USN-3980-2
https://ubuntu.com/security/notices/USN-3981-1
https://ubuntu.com/security/notices/USN-3981-2
https://www.bleepingcomputer.com/news/security/broadcom-wifi-driver-flaws-expose-computers-phones-iot-to-rce-attacks/
| +| kernel-headers | CVE-2019-9506 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.14.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
http://seclists.org/fulldisclosure/2019/Aug/11
http://seclists.org/fulldisclosure/2019/Aug/13
http://seclists.org/fulldisclosure/2019/Aug/14
http://seclists.org/fulldisclosure/2019/Aug/15
http://www.cs.ox.ac.uk/publications/publication12404-abstract.html
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en
https://access.redhat.com/errata/RHSA-2019:2975
https://access.redhat.com/errata/RHSA-2019:3055
https://access.redhat.com/errata/RHSA-2019:3076
https://access.redhat.com/errata/RHSA-2019:3089
https://access.redhat.com/errata/RHSA-2019:3165
https://access.redhat.com/errata/RHSA-2019:3187
https://access.redhat.com/errata/RHSA-2019:3217
https://access.redhat.com/errata/RHSA-2019:3218
https://access.redhat.com/errata/RHSA-2019:3220
https://access.redhat.com/errata/RHSA-2019:3231
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/errata/RHSA-2020:0204
https://access.redhat.com/security/cve/CVE-2019-9506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506
https://knobattack.com/
https://linux.oracle.com/cve/CVE-2019-9506.html
https://linux.oracle.com/errata/ELSA-2019-3517.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4147-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4147-1/
https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/
https://www.kb.cert.org/vuls/id/918987/
https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli
| +| kernel-headers | CVE-2020-0466 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-0466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0466
https://git.kernel.org/linus/52c479697c9b73f628140dcdfcd39ea302d05482
https://git.kernel.org/linus/a9ed4a6560b8562b7e2e2bed9527e88001f7b682
https://linux.oracle.com/cve/CVE-2020-0466.html
https://linux.oracle.com/errata/ELSA-2022-0620.html
https://source.android.com/security/bulletin/2020-12-01
https://ubuntu.com/security/notices/USN-4912-1
| +| kernel-headers | CVE-2020-10711 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.21.2.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
https://access.redhat.com/security/cve/CVE-2020-10711
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
https://linux.oracle.com/cve/CVE-2020-10711.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lore.kernel.org/netdev/07d99ae197bfdb2964931201db67b6cd0b38db5b.1589276729.git.pabeni@redhat.com/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-10711
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4411-1
https://ubuntu.com/security/notices/USN-4412-1
https://ubuntu.com/security/notices/USN-4413-1
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4419-1
https://usn.ubuntu.com/4411-1/
https://usn.ubuntu.com/4412-1/
https://usn.ubuntu.com/4413-1/
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4419-1/
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
https://www.openwall.com/lists/oss-security/2020/05/12/2
| +| kernel-headers | CVE-2020-10757 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1127.18.2.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-10757
https://bugzilla.redhat.com/show_bug.cgi?id=1842525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
https://linux.oracle.com/cve/CVE-2020-10757.html
https://linux.oracle.com/errata/ELSA-2020-5756.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/
https://nvd.nist.gov/vuln/detail/CVE-2020-10757
https://security.netapp.com/advisory/ntap-20200702-0004/
https://ubuntu.com/security/notices/USN-4426-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://ubuntu.com/security/notices/USN-4483-1
https://usn.ubuntu.com/4426-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
https://usn.ubuntu.com/4483-1/
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
https://www.openwall.com/lists/oss-security/2020/06/04/4
| +| kernel-headers | CVE-2020-12362 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.31.1.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362
https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| kernel-headers | CVE-2020-12653 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1127.18.2.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://www.openwall.com/lists/oss-security/2020/05/08/2
https://access.redhat.com/security/cve/CVE-2020-12653
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d
https://git.kernel.org/linus/b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d (5.6-rc1)
https://github.com/torvalds/linux/commit/b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d
https://linux.oracle.com/cve/CVE-2020-12653.html
https://linux.oracle.com/errata/ELSA-2021-9030.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12653
https://security.netapp.com/advisory/ntap-20200608-0001/
https://www.debian.org/security/2020/dsa-4698
| +| kernel-headers | CVE-2020-12654 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1127.18.2.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://www.openwall.com/lists/oss-security/2020/05/08/2
https://access.redhat.com/security/cve/CVE-2020-12654
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a9b153c5591548612c3955c9600a98150c81875
https://git.kernel.org/linus/3a9b153c5591548612c3955c9600a98150c81875 (5.6-rc1)
https://github.com/torvalds/linux/commit/3a9b153c5591548612c3955c9600a98150c81875
https://linux.oracle.com/cve/CVE-2020-12654.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12654
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4392-1
https://ubuntu.com/security/notices/USN-4393-1
https://usn.ubuntu.com/4392-1/
https://usn.ubuntu.com/4393-1/
https://www.debian.org/security/2020/dsa-4698
| +| kernel-headers | CVE-2020-12888 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.26.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://www.openwall.com/lists/oss-security/2020/05/19/6
https://access.redhat.com/security/cve/CVE-2020-12888
https://bugzilla.redhat.com/show_bug.cgi?id=1836244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12888
https://linux.oracle.com/cve/CVE-2020-12888.html
https://linux.oracle.com/errata/ELSA-2020-5805.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBEHRQQZTKJTPQFPY3JAO7MQ4JAFEQNW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXGMJHWTMQI34NJZ4BHL3ZVF264AWBF2/
https://lore.kernel.org/kvm/158871401328.15589.17598154478222071285.stgit@gimli.home/
https://lore.kernel.org/kvm/158871570274.15589.10563806532874116326.stgit@gimli.home/
https://nvd.nist.gov/vuln/detail/CVE-2020-12888
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4525-1
https://ubuntu.com/security/notices/USN-4526-1
https://ubuntu.com/security/notices/USN-5361-1
https://usn.ubuntu.com/4525-1/
https://usn.ubuntu.com/4526-1/
| +| kernel-headers | CVE-2020-29661 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.35.1.el7a |
Expand...http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html
http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
http://www.openwall.com/lists/oss-security/2020/12/10/1
https://access.redhat.com/security/cve/CVE-2020-29661
https://bugs.chromium.org/p/project-zero/issues/detail?id=2125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661
https://git.kernel.org/linus/54ffccbf053b5b6ca4f6e45094b942fab92a25fc
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc
https://linux.oracle.com/cve/CVE-2020-29661.html
https://linux.oracle.com/errata/ELSA-2021-9212.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/
https://nvd.nist.gov/vuln/detail/CVE-2020-29661
https://security.netapp.com/advisory/ntap-20210122-0001/
https://ubuntu.com/security/notices/USN-4748-1
https://ubuntu.com/security/notices/USN-4749-1
https://ubuntu.com/security/notices/USN-4750-1
https://ubuntu.com/security/notices/USN-4751-1
https://ubuntu.com/security/notices/USN-4752-1
https://ubuntu.com/security/notices/USN-5130-1
https://www.debian.org/security/2021/dsa-4843
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| kernel-headers | CVE-2020-8834 | HIGH | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
https://access.redhat.com/security/cve/CVE-2020-8834
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1867717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8834
https://ubuntu.com/security/notices/USN-4318-1
https://usn.ubuntu.com/4318-1/
https://usn.ubuntu.com/usn/usn-4318-1
https://www.openwall.com/lists/oss-security/2020/04/06/2
| +| kernel-headers | CVE-2021-0920 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-0920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920
https://git.kernel.org/linus/cbcf01128d0a92e131bd09f1688fe032480b65ca
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca
https://linux.oracle.com/cve/CVE-2021-0920.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://source.android.com/security/bulletin/2021-11-01
https://ubuntu.com/security/notices/USN-5361-1
| +| kernel-headers | CVE-2021-22543 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.45.1.el7 |
Expand...http://www.openwall.com/lists/oss-security/2021/06/26/1
https://access.redhat.com/security/cve/CVE-2021-22543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543
https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584
https://github.com/torvalds/linux/commit/f8be156be163a052a067306417cd0ff679068c97
https://linux.oracle.com/cve/CVE-2021-22543.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/
https://security.netapp.com/advisory/ntap-20210708-0002/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5071-3
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://www.openwall.com/lists/oss-security/2021/05/26/3
https://www.openwall.com/lists/oss-security/2021/05/26/4
https://www.openwall.com/lists/oss-security/2021/05/26/5
| +| kernel-headers | CVE-2021-27364 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.36.1.el7a |
Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
https://access.redhat.com/security/cve/CVE-2021-27364
https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
https://bugzilla.suse.com/show_bug.cgi?id=1182717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364
https://git.kernel.org/linus/688e8128b7a92df982709a4137ea4588d16f24aa
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa
https://github.com/grimm-co/NotQuite0DayFriday/tree/trunk/2021.03.12-linux-iscsi
https://linux.oracle.com/cve/CVE-2021-27364.html
https://linux.oracle.com/errata/ELSA-2021-9212.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27364
https://security.netapp.com/advisory/ntap-20210409-0001/
https://ubuntu.com/security/notices/USN-4883-1
https://ubuntu.com/security/notices/USN-4887-1
https://ubuntu.com/security/notices/USN-4889-1
https://ubuntu.com/security/notices/USN-4901-1
https://www.openwall.com/lists/oss-security/2021/03/06/1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| kernel-headers | CVE-2021-27365 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.36.1.el7a |
Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
https://access.redhat.com/security/cve/CVE-2021-27365
https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
https://bugzilla.suse.com/show_bug.cgi?id=1182715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365
https://git.kernel.org/linus/ec98ea7070e94cc25a422ec97d1421e28d97b7ee
https://git.kernel.org/linus/f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec98ea7070e94cc25a422ec97d1421e28d97b7ee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9dbdf97a5bd92b1a49cee3d591b55b11fd7a6d5
https://linux.oracle.com/cve/CVE-2021-27365.html
https://linux.oracle.com/errata/ELSA-2021-9212.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27365
https://security.netapp.com/advisory/ntap-20210409-0001/
https://ubuntu.com/security/notices/USN-4883-1
https://ubuntu.com/security/notices/USN-4887-1
https://ubuntu.com/security/notices/USN-4889-1
https://ubuntu.com/security/notices/USN-4901-1
https://www.openwall.com/lists/oss-security/2021/03/06/1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| kernel-headers | CVE-2021-3347 | HIGH | 3.10.0-1062.7.1.el7 | 4.14.0-115.36.1.el7a |
Expand...http://www.openwall.com/lists/oss-security/2021/01/29/4
http://www.openwall.com/lists/oss-security/2021/01/29/5
http://www.openwall.com/lists/oss-security/2021/02/01/4
https://access.redhat.com/security/cve/CVE-2021-3347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c64396cc36c6e60704ab06c1fb1c4a46179c9120
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2
https://linux.oracle.com/cve/CVE-2021-3347.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CXAVDAK4RLAHBHHGEPL73UFXSI6BXQ7Q/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOBMXDJABYE76RKNBAWA2E4TSSBX7CSJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-3347
https://security.netapp.com/advisory/ntap-20210304-0005/
https://ubuntu.com/security/notices/USN-4878-1
https://ubuntu.com/security/notices/USN-4884-1
https://ubuntu.com/security/notices/USN-4907-1
https://ubuntu.com/security/notices/USN-4910-1
https://www.debian.org/security/2021/dsa-4843
https://www.openwall.com/lists/oss-security/2021/01/29/1
https://www.openwall.com/lists/oss-security/2021/01/29/3
| +| kernel-headers | CVE-2021-37576 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.45.1.el7 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/27/2
https://access.redhat.com/security/cve/CVE-2021-37576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576
https://git.kernel.org/linus/f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a (5.14-rc3)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a
https://linux.oracle.com/cve/CVE-2021-37576.html
https://linux.oracle.com/errata/ELSA-2021-3801.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/
https://lore.kernel.org/linuxppc-dev/87im0x1lqi.fsf@mpe.ellerman.id.au/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-37576
https://security.netapp.com/advisory/ntap-20210917-0005/
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://www.debian.org/security/2021/dsa-4978
https://www.openwall.com/lists/oss-security/2021/07/26/1
| +| kernel-headers | CVE-2021-3864 | HIGH | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864
https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
https://www.openwall.com/lists/oss-security/2021/10/20/2
| +| kernel-headers | CVE-2021-4155 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json
https://access.redhat.com/security/cve/CVE-2021-4155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
https://git.kernel.org/linus/983d8e60f50806f90534cc5373d0ce867e5aaf79 (5.16)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79
https://linux.oracle.com/cve/CVE-2021-4155.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5362-1
https://www.openwall.com/lists/oss-security/2022/01/10/1
| +| kernel-headers | CVE-2022-0330 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json
https://access.redhat.com/security/cve/CVE-2022-0330
https://bugzilla.redhat.com/show_bug.cgi?id=2042404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c
https://linux.oracle.com/cve/CVE-2022-0330.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0330
https://security.netapp.com/advisory/ntap-20220526-0001/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5362-1
https://www.openwall.com/lists/oss-security/2022/01/25/12
| +| kernel-headers | CVE-2022-1012 | HIGH | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1012
https://kernel.googlesource.com/pub/scm/linux/kernel/git/jkirsher/net-queue/+/b2d057560b8107c633b39aabe517ff9d93f285e3%5E%21/
| +| kernel-headers | CVE-2022-22942 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
https://linux.oracle.com/cve/CVE-2022-22942.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5362-1
https://www.openwall.com/lists/oss-security/2022/01/27/4
| +| kernel-headers | CVE-2012-4542 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2
http://marc.info/?l=linux-kernel&m=135904012416042&w=2
http://rhn.redhat.com/errata/RHSA-2013-0496.html
http://rhn.redhat.com/errata/RHSA-2013-0579.html
http://rhn.redhat.com/errata/RHSA-2013-0882.html
http://rhn.redhat.com/errata/RHSA-2013-0928.html
https://access.redhat.com/security/cve/CVE-2012-4542
https://bugzilla.redhat.com/show_bug.cgi?id=875360
https://linux.oracle.com/cve/CVE-2012-4542.html
https://linux.oracle.com/errata/ELSA-2013-2534.html
https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
| +| kernel-headers | CVE-2013-4270 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2433c8f094a008895e66f25bd1773cdb01c91d01
http://rhn.redhat.com/errata/RHSA-2014-0100.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5
http://www.ubuntu.com/usn/USN-2049-1
https://access.redhat.com/security/cve/CVE-2013-4270
https://bugzilla.redhat.com/show_bug.cgi?id=1027752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4270
https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01
https://linux.oracle.com/cve/CVE-2013-4270.html
https://linux.oracle.com/errata/ELSA-2014-3002.html
https://ubuntu.com/security/notices/USN-2020-1
https://ubuntu.com/security/notices/USN-2023-1
https://ubuntu.com/security/notices/USN-2049-1
| +| kernel-headers | CVE-2013-4350 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=95ee62083cb6453e056562d91f597552021e6ae7
http://rhn.redhat.com/errata/RHSA-2013-1490.html
http://www.openwall.com/lists/oss-security/2013/09/13
http://www.openwall.com/lists/oss-security/2013/09/13/3
http://www.ubuntu.com/usn/USN-2019-1
http://www.ubuntu.com/usn/USN-2021-1
http://www.ubuntu.com/usn/USN-2022-1
http://www.ubuntu.com/usn/USN-2024-1
http://www.ubuntu.com/usn/USN-2038-1
http://www.ubuntu.com/usn/USN-2039-1
http://www.ubuntu.com/usn/USN-2041-1
http://www.ubuntu.com/usn/USN-2045-1
http://www.ubuntu.com/usn/USN-2049-1
http://www.ubuntu.com/usn/USN-2050-1
https://access.redhat.com/security/cve/CVE-2013-4350
https://bugzilla.redhat.com/show_bug.cgi?id=1007872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4350
https://github.com/torvalds/linux/commit/95ee62083cb6453e056562d91f597552021e6ae7
https://linux.oracle.com/cve/CVE-2013-4350.html
https://linux.oracle.com/errata/ELSA-2014-3002.html
https://ubuntu.com/security/notices/USN-2019-1
https://ubuntu.com/security/notices/USN-2021-1
https://ubuntu.com/security/notices/USN-2022-1
https://ubuntu.com/security/notices/USN-2024-1
https://ubuntu.com/security/notices/USN-2038-1
https://ubuntu.com/security/notices/USN-2039-1
https://ubuntu.com/security/notices/USN-2041-1
https://ubuntu.com/security/notices/USN-2045-1
https://ubuntu.com/security/notices/USN-2049-1
https://ubuntu.com/security/notices/USN-2050-1
| +| kernel-headers | CVE-2013-7446 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2015/dsa-3426
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
http://www.openwall.com/lists/oss-security/2015/11/18/16
http://www.openwall.com/lists/oss-security/2015/11/18/9
http://www.securityfocus.com/bid/77638
http://www.securitytracker.com/id/1034557
http://www.spinics.net/lists/netdev/msg318826.html
http://www.ubuntu.com/usn/USN-2886-1
http://www.ubuntu.com/usn/USN-2887-1
http://www.ubuntu.com/usn/USN-2887-2
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2889-1
http://www.ubuntu.com/usn/USN-2889-2
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
https://access.redhat.com/security/cve/CVE-2013-7446
https://bugzilla.redhat.com/show_bug.cgi?id=1273845
https://bugzilla.redhat.com/show_bug.cgi?id=1282688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446
https://forums.grsecurity.net/viewtopic.php?f=3&t=4150
https://github.com/torvalds/linux/commit/7d267278a9ece963d77eefec61630223fce08c6c
https://groups.google.com/forum/#!topic/syzkaller/3twDUI4Cpm8
https://linux.oracle.com/cve/CVE-2013-7446.html
https://linux.oracle.com/errata/ELSA-2017-3516.html
https://lkml.org/lkml/2013/10/14/424
https://lkml.org/lkml/2014/5/15/532
https://lkml.org/lkml/2015/9/13/195
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2887-1
https://ubuntu.com/security/notices/USN-2887-2
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2889-1
https://ubuntu.com/security/notices/USN-2889-2
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
| +| kernel-headers | CVE-2014-2039 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8d7f6690cedb83456edd41c9bd583783f0703bf0
http://linux.oracle.com/errata/ELSA-2014-0771.html
http://secunia.com/advisories/59262
http://secunia.com/advisories/59309
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.5
http://www.openwall.com/lists/oss-security/2014/02/20/14
http://www.securityfocus.com/bid/65700
https://access.redhat.com/security/cve/CVE-2014-2039
https://bugzilla.redhat.com/show_bug.cgi?id=1067558
https://github.com/torvalds/linux/commit/8d7f6690cedb83456edd41c9bd583783f0703bf0
https://linux.oracle.com/cve/CVE-2014-2039.html
https://linux.oracle.com/errata/ELSA-2014-0771.html
| +| kernel-headers | CVE-2014-9710 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html
http://www.openwall.com/lists/oss-security/2015/03/24/11
http://www.securitytracker.com/id/1032418
https://access.redhat.com/security/cve/CVE-2014-9710
https://bugzilla.redhat.com/show_bug.cgi?id=1205079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9710
https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339
https://linux.oracle.com/cve/CVE-2014-9710.html
https://linux.oracle.com/errata/ELSA-2017-3597.html
https://ubuntu.com/security/notices/USN-2615-1
https://ubuntu.com/security/notices/USN-2616-1
https://ubuntu.com/security/notices/USN-2662-1
https://ubuntu.com/security/notices/USN-2663-1
| +| kernel-headers | CVE-2014-9728 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1d47b262952a45aae62bd49cfaf33dd76c11a2c
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
http://www.openwall.com/lists/oss-security/2015/06/02/7
http://www.securityfocus.com/bid/74964
https://access.redhat.com/security/cve/CVE-2014-9728
https://bugzilla.redhat.com/show_bug.cgi?id=1228229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9728
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1d47b262952a45aae62bd49cfaf33dd76c11a2c (v3.19-rc3)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 (v3.19-rc3)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9 (v3.19-rc3)
https://github.com/torvalds/linux/commit/a1d47b262952a45aae62bd49cfaf33dd76c11a2c
https://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9
https://linux.oracle.com/cve/CVE-2014-9728.html
https://linux.oracle.com/errata/ELSA-2019-4316.html
https://ubuntu.com/security/notices/USN-2517-1
https://ubuntu.com/security/notices/USN-2518-1
https://ubuntu.com/security/notices/USN-2541-1
https://ubuntu.com/security/notices/USN-2542-1
https://ubuntu.com/security/notices/USN-2543-1
https://ubuntu.com/security/notices/USN-2544-1
| +| kernel-headers | CVE-2014-9729 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
http://www.openwall.com/lists/oss-security/2015/06/02/7
http://www.securityfocus.com/bid/74964
https://access.redhat.com/security/cve/CVE-2014-9729
https://bugzilla.redhat.com/show_bug.cgi?id=1228229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9729
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 (v3.19-rc3)
https://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
https://ubuntu.com/security/notices/USN-2517-1
https://ubuntu.com/security/notices/USN-2518-1
https://ubuntu.com/security/notices/USN-2541-1
https://ubuntu.com/security/notices/USN-2542-1
https://ubuntu.com/security/notices/USN-2543-1
https://ubuntu.com/security/notices/USN-2544-1
| +| kernel-headers | CVE-2014-9730 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
http://www.openwall.com/lists/oss-security/2015/06/02/7
http://www.securityfocus.com/bid/74964
https://access.redhat.com/security/cve/CVE-2014-9730
https://bugzilla.redhat.com/show_bug.cgi?id=1228229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9730
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9 (v3.19-rc3)
https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9
https://ubuntu.com/security/notices/USN-2517-1
https://ubuntu.com/security/notices/USN-2518-1
https://ubuntu.com/security/notices/USN-2541-1
https://ubuntu.com/security/notices/USN-2542-1
https://ubuntu.com/security/notices/USN-2543-1
https://ubuntu.com/security/notices/USN-2544-1
| +| kernel-headers | CVE-2015-4167 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23b133bdc452aa441fcb9b82cbf6dd05cfd342d0
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.debian.org/security/2015/dsa-3290
http://www.debian.org/security/2015/dsa-3313
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.1
http://www.openwall.com/lists/oss-security/2015/06/02/6
http://www.securityfocus.com/bid/74963
http://www.securitytracker.com/id/1033187
http://www.ubuntu.com/usn/USN-2631-1
http://www.ubuntu.com/usn/USN-2632-1
https://access.redhat.com/security/cve/CVE-2015-4167
https://bugzilla.redhat.com/show_bug.cgi?id=1228204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4167
https://github.com/torvalds/linux/commit/23b133bdc452aa441fcb9b82cbf6dd05cfd342d0
https://linux.oracle.com/cve/CVE-2015-4167.html
https://linux.oracle.com/errata/ELSA-2017-3597.html
https://ubuntu.com/security/notices/USN-2631-1
https://ubuntu.com/security/notices/USN-2632-1
https://ubuntu.com/security/notices/USN-2662-1
https://ubuntu.com/security/notices/USN-2663-1
https://ubuntu.com/security/notices/USN-2664-1
https://ubuntu.com/security/notices/USN-2666-1
| +| kernel-headers | CVE-2015-4177 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cd4a40174b71acd021877341684d8bb1dc8ea4ae
http://openwall.com/lists/oss-security/2015/05/29/10
http://openwall.com/lists/oss-security/2015/05/29/5
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.5
http://www.openwall.com/lists/oss-security/2015/06/04/5
https://access.redhat.com/security/cve/CVE-2015-4177
https://bugzilla.redhat.com/show_bug.cgi?id=1248486
https://github.com/torvalds/linux/commit/cd4a40174b71acd021877341684d8bb1dc8ea4ae
| +| kernel-headers | CVE-2015-4692 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160829.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161144.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://www.debian.org/security/2015/dsa-3329
http://www.openwall.com/lists/oss-security/2015/06/10/6
http://www.openwall.com/lists/oss-security/2015/06/21/1
http://www.securityfocus.com/bid/75142
http://www.securitytracker.com/id/1032798
http://www.ubuntu.com/usn/USN-2680-1
http://www.ubuntu.com/usn/USN-2681-1
http://www.ubuntu.com/usn/USN-2682-1
http://www.ubuntu.com/usn/USN-2683-1
http://www.ubuntu.com/usn/USN-2684-1
https://access.redhat.com/security/cve/CVE-2015-4692
https://bugzilla.redhat.com/show_bug.cgi?id=1230770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4692
https://github.com/torvalds/linux/commit/ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009
https://lkml.org/lkml/2015/6/4/163
https://ubuntu.com/security/notices/USN-2680-1
https://ubuntu.com/security/notices/USN-2681-1
https://ubuntu.com/security/notices/USN-2682-1
https://ubuntu.com/security/notices/USN-2683-1
https://ubuntu.com/security/notices/USN-2684-1
| +| kernel-headers | CVE-2015-5707 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html
http://www.debian.org/security/2015/dsa-3329
http://www.openwall.com/lists/oss-security/2015/08/01/6
http://www.securityfocus.com/bid/76145
http://www.securitytracker.com/id/1033521
http://www.ubuntu.com/usn/USN-2733-1
http://www.ubuntu.com/usn/USN-2734-1
http://www.ubuntu.com/usn/USN-2737-1
http://www.ubuntu.com/usn/USN-2738-1
http://www.ubuntu.com/usn/USN-2750-1
http://www.ubuntu.com/usn/USN-2759-1
http://www.ubuntu.com/usn/USN-2760-1
https://access.redhat.com/security/cve/CVE-2015-5707
https://bugzilla.redhat.com/show_bug.cgi?id=1250030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5707
https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81
https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee
https://linux.oracle.com/cve/CVE-2015-5707.html
https://linux.oracle.com/errata/ELSA-2017-3535.html
https://source.android.com/security/bulletin/2017-07-01
https://ubuntu.com/security/notices/USN-2733-1
https://ubuntu.com/security/notices/USN-2734-1
https://ubuntu.com/security/notices/USN-2737-1
https://ubuntu.com/security/notices/USN-2738-1
https://ubuntu.com/security/notices/USN-2750-1
https://ubuntu.com/security/notices/USN-2759-1
https://ubuntu.com/security/notices/USN-2760-1
| +| kernel-headers | CVE-2015-7513 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0185604c2d82c560dab2f2933a18f797e74ab5a8
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html
http://www.debian.org/security/2016/dsa-3434
http://www.openwall.com/lists/oss-security/2016/01/07/2
http://www.securityfocus.com/bid/79901
http://www.securitytracker.com/id/1034602
http://www.ubuntu.com/usn/USN-2886-1
http://www.ubuntu.com/usn/USN-2887-1
http://www.ubuntu.com/usn/USN-2887-2
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2889-1
http://www.ubuntu.com/usn/USN-2889-2
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
https://access.redhat.com/security/cve/CVE-2015-7513
https://bugzilla.redhat.com/show_bug.cgi?id=1284847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513
https://git.kernel.org/linus/0185604c2d82c560dab2f2933a18f797e74ab5a8 (v4.4-rc7)
https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2887-1
https://ubuntu.com/security/notices/USN-2887-2
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2889-1
https://ubuntu.com/security/notices/USN-2889-2
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
| +| kernel-headers | CVE-2015-7550 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b4a1b4f5047e4f54e194681125c74c0aa64d637d
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3434
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4
http://www.securityfocus.com/bid/79903
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
http://www.ubuntu.com/usn/USN-2911-1
http://www.ubuntu.com/usn/USN-2911-2
https://access.redhat.com/security/cve/CVE-2015-7550
https://bugzilla.redhat.com/show_bug.cgi?id=1291197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550
https://git.kernel.org/linus/b4a1b4f5047e4f54e194681125c74c0aa64d637d
https://github.com/torvalds/linux/commit/b4a1b4f5047e4f54e194681125c74c0aa64d637d
https://security-tracker.debian.org/tracker/CVE-2015-7550
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
https://ubuntu.com/security/notices/USN-2907-1
https://ubuntu.com/security/notices/USN-2907-2
https://ubuntu.com/security/notices/USN-2910-1
https://ubuntu.com/security/notices/USN-2911-1
https://ubuntu.com/security/notices/USN-2911-2
| +| kernel-headers | CVE-2015-8953 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ab79efab0a0ba01a74df782eb7fa44b044dae8b5
http://seclists.org/oss-sec/2016/q3/371
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.6
http://www.openwall.com/lists/oss-security/2016/08/23/9
http://www.securityfocus.com/bid/92611
https://access.redhat.com/security/cve/CVE-2015-8953
https://bugzilla.redhat.com/show_bug.cgi?id=1367814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8953
https://github.com/torvalds/linux/commit/ab79efab0a0ba01a74df782eb7fa44b044dae8b5
| +| kernel-headers | CVE-2015-9289 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2015-9289
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1fa2337a315a2448c5434f41e00d56b01a22283c
https://github.com/torvalds/linux/commit/1fa2337a315a2448c5434f41e00d56b01a22283c
https://linux.oracle.com/cve/CVE-2015-9289.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.4
| +| kernel-headers | CVE-2016-0723 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://lkml.iu.edu/hypermail/linux/kernel/1511.3/03045.html
http://source.android.com/security/bulletin/2016-07-01.html
http://www.debian.org/security/2016/dsa-3448
http://www.debian.org/security/2016/dsa-3503
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/82950
http://www.securitytracker.com/id/1035695
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-0723
https://bugzilla.redhat.com/show_bug.cgi?id=1296253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0723
https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439
https://linux.oracle.com/cve/CVE-2016-0723.html
https://linux.oracle.com/errata/ELSA-2016-3596.html
https://security-tracker.debian.org/tracker/CVE-2016-0723
https://support.f5.com/csp/article/K43650115
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
| +| kernel-headers | CVE-2016-0821 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8a5e5e02fc83aaf67053ab53b359af08c6c49aaf
http://source.android.com/security/bulletin/2016-03-01.html
http://www.debian.org/security/2016/dsa-3607
http://www.openwall.com/lists/oss-security/2015/05/02/6
http://www.securityfocus.com/bid/84260
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
https://access.redhat.com/security/cve/CVE-2016-0821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0821
https://github.com/torvalds/linux/commit/8a5e5e02fc83aaf67053ab53b359af08c6c49aaf
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
| +| kernel-headers | CVE-2016-10044 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a
http://source.android.com/security/bulletin/2017-02-01.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7
http://www.securityfocus.com/bid/96122
http://www.securitytracker.com/id/1037798
https://access.redhat.com/security/cve/CVE-2016-10044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044
https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a
https://linux.oracle.com/cve/CVE-2016-10044.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://ubuntu.com/security/notices/USN-3422-1
https://ubuntu.com/security/notices/USN-3422-2
| +| kernel-headers | CVE-2016-2085 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=613317bd212c585c20796c10afe5daaa95d4b0a1
http://www.ubuntu.com/usn/USN-2946-1
http://www.ubuntu.com/usn/USN-2946-2
http://www.ubuntu.com/usn/USN-2947-1
http://www.ubuntu.com/usn/USN-2947-2
http://www.ubuntu.com/usn/USN-2947-3
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2949-1
https://access.redhat.com/security/cve/CVE-2016-2085
https://bugzilla.redhat.com/show_bug.cgi?id=1324867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2085
https://github.com/torvalds/linux/commit/613317bd212c585c20796c10afe5daaa95d4b0a1
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2085.html
https://security-tracker.debian.org/tracker/CVE-2016-2085
https://ubuntu.com/security/notices/USN-2946-1
https://ubuntu.com/security/notices/USN-2946-2
https://ubuntu.com/security/notices/USN-2947-1
https://ubuntu.com/security/notices/USN-2947-2
https://ubuntu.com/security/notices/USN-2947-3
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2949-1
| +| kernel-headers | CVE-2016-2546 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=af368027a49a751d6ff4ee9e3f9961f35bb4fede
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83384
http://www.securitytracker.com/id/1035301
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2546
https://bugzilla.redhat.com/show_bug.cgi?id=1311564
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546
https://github.com/torvalds/linux/commit/af368027a49a751d6ff4ee9e3f9961f35bb4fede
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
| +| kernel-headers | CVE-2016-3157 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.debian.org/security/2016/dsa-3607
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/84594
http://www.securitytracker.com/id/1035308
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://xenbits.xen.org/xsa/advisory-171.html
http://xenbits.xen.org/xsa/xsa171.patch
https://access.redhat.com/security/cve/CVE-2016-3157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3157
https://linux.oracle.com/cve/CVE-2016-3157.html
https://linux.oracle.com/errata/ELSA-2016-3657.html
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
| +| kernel-headers | CVE-2016-4794 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2574.html
http://rhn.redhat.com/errata/RHSA-2016-2584.html
http://www.openwall.com/lists/oss-security/2016/05/12/6
http://www.securityfocus.com/bid/90625
http://www.ubuntu.com/usn/USN-3053-1
http://www.ubuntu.com/usn/USN-3054-1
http://www.ubuntu.com/usn/USN-3055-1
http://www.ubuntu.com/usn/USN-3056-1
http://www.ubuntu.com/usn/USN-3057-1
https://access.redhat.com/security/cve/CVE-2016-4794
https://bugzilla.redhat.com/show_bug.cgi?id=1335889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4794
https://linux.oracle.com/cve/CVE-2016-4794.html
https://linux.oracle.com/errata/ELSA-2016-3644.html
https://lkml.org/lkml/2016/4/17/125
https://source.android.com/security/bulletin/2016-12-01.html
https://ubuntu.com/security/notices/USN-3053-1
https://ubuntu.com/security/notices/USN-3054-1
https://ubuntu.com/security/notices/USN-3055-1
https://ubuntu.com/security/notices/USN-3056-1
https://ubuntu.com/security/notices/USN-3057-1
| +| kernel-headers | CVE-2016-7911 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8ba8682107ee2ca3347354e018865d8e1967c5f4
http://source.android.com/security/bulletin/2016-11-01.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.6
http://www.securityfocus.com/bid/94135
https://access.redhat.com/security/cve/CVE-2016-7911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7911
https://github.com/torvalds/linux/commit/8ba8682107ee2ca3347354e018865d8e1967c5f4
https://ubuntu.com/security/notices/USN-3206-1
https://ubuntu.com/security/notices/USN-3207-1
https://ubuntu.com/security/notices/USN-3207-2
| +| kernel-headers | CVE-2017-1000111 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100267
http://www.securitytracker.com/id/1039132
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2017:3200
https://access.redhat.com/security/cve/CVE-2017-1000111
https://access.redhat.com/security/cve/cve-2017-1000111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=c27927e372f0785f3303e8fad94b85945e2c97b7
https://linux.oracle.com/cve/CVE-2017-1000111.html
https://linux.oracle.com/errata/ELSA-2017-3633.html
https://ubuntu.com/security/notices/USN-3384-1
https://ubuntu.com/security/notices/USN-3384-2
https://ubuntu.com/security/notices/USN-3385-1
https://ubuntu.com/security/notices/USN-3385-2
https://ubuntu.com/security/notices/USN-3386-1
https://ubuntu.com/security/notices/USN-3386-2
| +| kernel-headers | CVE-2017-1000255 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...http://www.securityfocus.com/bid/101264
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/security/cve/CVE-2017-1000255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000255
https://ubuntu.com/security/notices/USN-3443-1
https://ubuntu.com/security/notices/USN-3443-2
https://ubuntu.com/security/notices/USN-3487-1
| +| kernel-headers | CVE-2017-1000380 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ba3021b2c79b2fa9114f92790a99deb27a65b728
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d11662f4f798b50d8c8743f433842c3e40fe3378
http://www.debian.org/security/2017/dsa-3981
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.5
http://www.openwall.com/lists/oss-security/2017/06/12/2
http://www.securityfocus.com/bid/99121
https://access.redhat.com/errata/RHSA-2017:3295
https://access.redhat.com/errata/RHSA-2017:3315
https://access.redhat.com/errata/RHSA-2017:3322
https://access.redhat.com/security/cve/CVE-2017-1000380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380
https://github.com/torvalds/linux/commit/ba3021b2c79b2fa9114f92790a99deb27a65b728
https://github.com/torvalds/linux/commit/d11662f4f798b50d8c8743f433842c3e40fe3378
https://linux.oracle.com/cve/CVE-2017-1000380.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://source.android.com/security/bulletin/pixel/2017-12-01
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
| +| kernel-headers | CVE-2017-1000410 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...http://seclists.org/oss-sec/2017/q4/357
http://www.openwall.com/lists/oss-security/2017/12/06/3
http://www.securityfocus.com/bid/102101
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1130
https://access.redhat.com/errata/RHSA-2018:1170
https://access.redhat.com/errata/RHSA-2018:1319
https://access.redhat.com/security/cve/CVE-2017-1000410
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2017-1000410.html
https://linux.oracle.com/errata/ELSA-2018-4134.html
https://ubuntu.com/security/notices/USN-3933-1
https://ubuntu.com/security/notices/USN-3933-2
https://usn.ubuntu.com/3933-1/
https://usn.ubuntu.com/3933-2/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
| +| kernel-headers | CVE-2017-11176 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.securityfocus.com/bid/99919
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2018:0169
https://access.redhat.com/errata/RHSA-2018:3822
https://access.redhat.com/security/cve/CVE-2017-11176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1
https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2017-11176.html
https://linux.oracle.com/errata/ELSA-2018-0169.html
https://ubuntu.com/security/notices/USN-3405-1
https://ubuntu.com/security/notices/USN-3405-2
https://ubuntu.com/security/notices/USN-3468-1
https://ubuntu.com/security/notices/USN-3468-2
https://ubuntu.com/security/notices/USN-3468-3
https://ubuntu.com/security/notices/USN-3470-1
https://ubuntu.com/security/notices/USN-3470-2
https://www.exploit-db.com/exploits/45553/
| +| kernel-headers | CVE-2017-11600 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://seclists.org/bugtraq/2017/Jul/30
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/99928
https://access.redhat.com/errata/RHSA-2018:1965
https://access.redhat.com/errata/RHSA-2018:2003
https://access.redhat.com/errata/RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1190
https://access.redhat.com/security/cve/CVE-2017-11600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/xfrm/xfrm_policy.c?id=7bab09631c2a303f87a7eb7e3d69e888673b9b7e
https://linux.oracle.com/cve/CVE-2017-11600.html
https://linux.oracle.com/errata/ELSA-2018-4172.html
https://source.android.com/security/bulletin/pixel/2017-11-01
| +| kernel-headers | CVE-2017-12146 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.11.0-44.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6265539776a0810b7ce6398c27866ddb9c6bd154
http://www.debian.org/security/2017/dsa-3981
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.1
http://www.securityfocus.com/bid/100651
https://access.redhat.com/security/cve/CVE-2017-12146
https://bugzilla.redhat.com/show_bug.cgi?id=1489078
https://bugzilla.suse.com/show_bug.cgi?id=1057474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12146
https://git.kernel.org/linus/6265539776a0810b7ce6398c27866ddb9c6bd154
https://github.com/torvalds/linux/commit/6265539776a0810b7ce6398c27866ddb9c6bd154
https://linux.oracle.com/cve/CVE-2017-12146.html
https://linux.oracle.com/errata/ELSA-2018-4084.html
https://source.android.com/security/bulletin/2017-09-01
https://ubuntu.com/security/notices/USN-3508-1
https://ubuntu.com/security/notices/USN-3508-2
| +| kernel-headers | CVE-2017-12168 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.11.0-44.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9e3f7a29694049edd728e2400ab57ad7553e5aa9
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.11
https://access.redhat.com/security/cve/CVE-2017-12168
https://bugzilla.redhat.com/show_bug.cgi?id=1492984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12168
https://git.kernel.org/linus/9e3f7a29694049edd728e2400ab57ad7553e5aa9 (4.9-rc6)
https://github.com/torvalds/linux/commit/9e3f7a29694049edd728e2400ab57ad7553e5aa9
| +| kernel-headers | CVE-2017-12190 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95d78c28b5a85bacbc29b8dba7c04babb9b0d467
http://seclists.org/oss-sec/2017/q4/52
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
http://www.securityfocus.com/bid/101911
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1190
https://access.redhat.com/security/cve/CVE-2017-12190
https://bugzilla.redhat.com/show_bug.cgi?id=1495089
https://bugzilla.suse.com/show_bug.cgi?id=1062568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190
https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d467
https://linux.oracle.com/cve/CVE-2017-12190.html
https://linux.oracle.com/errata/ELSA-2018-1854.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://marc.info/?t=150605752800001&r=1&w=2
https://support.f5.com/csp/article/K93472064?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3582-1
https://ubuntu.com/security/notices/USN-3582-2
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3582-1/
https://usn.ubuntu.com/3582-2/
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1495884.html
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1495887.html
| +| kernel-headers | CVE-2017-12192 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=37863c43b2c6464f252862bf2e9768264e961678
http://seclists.org/oss-sec/2017/q4/63
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.5
https://access.redhat.com/errata/RHSA-2018:0151
https://access.redhat.com/security/cve/CVE-2017-12192
https://bugzilla.redhat.com/show_bug.cgi?id=1493435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12192
https://github.com/torvalds/linux/commit/37863c43b2c6464f252862bf2e9768264e961678
https://linux.oracle.com/cve/CVE-2017-12192.html
https://linux.oracle.com/errata/ELSA-2020-2430.html
https://lkml.org/lkml/2017/9/18/764
https://ubuntu.com/security/notices/USN-3469-1
https://ubuntu.com/security/notices/USN-3469-2
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
| +| kernel-headers | CVE-2017-13693 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/100502
https://access.redhat.com/security/cve/CVE-2017-13693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| +| kernel-headers | CVE-2017-13694 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/100500
https://access.redhat.com/security/cve/CVE-2017-13694
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
https://patchwork.kernel.org/patch/9806085/
| +| kernel-headers | CVE-2017-13695 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/100497
https://access.redhat.com/security/cve/CVE-2017-13695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13695
https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5
https://linux.oracle.com/cve/CVE-2017-13695.html
https://linux.oracle.com/errata/ELSA-2018-4250.html
https://patchwork.kernel.org/patch/9850567/
https://ubuntu.com/security/notices/USN-3696-1
https://ubuntu.com/security/notices/USN-3696-2
https://ubuntu.com/security/notices/USN-3762-1
https://ubuntu.com/security/notices/USN-3762-2
https://usn.ubuntu.com/3696-1/
https://usn.ubuntu.com/3696-2/
https://usn.ubuntu.com/3762-1/
https://usn.ubuntu.com/3762-2/
| +| kernel-headers | CVE-2017-14051 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/100571
https://access.redhat.com/security/cve/CVE-2017-14051
https://bugzilla.kernel.org/show_bug.cgi?id=194061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14051
https://github.com/torvalds/linux/commit/e6f77540c067b48dee10f1e33678415bfcc89017
https://linux.oracle.com/cve/CVE-2017-14051.html
https://linux.oracle.com/errata/ELSA-2019-4317.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://patchwork.kernel.org/patch/9929625/
https://ubuntu.com/security/notices/USN-3469-1
https://ubuntu.com/security/notices/USN-3469-2
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
| +| kernel-headers | CVE-2017-14106 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=499350a5a6e7512d9ed369ed63a4244b6536f4f8
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100878
http://www.securitytracker.com/id/1039549
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2017:3200
https://access.redhat.com/errata/RHSA-2018:2172
https://access.redhat.com/security/cve/CVE-2017-14106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=499350a5a6e7512d9ed369ed63a4244b6536f4f8
https://github.com/torvalds/linux/commit/499350a5a6e7512d9ed369ed63a4244b6536f4f8
https://linux.oracle.com/cve/CVE-2017-14106.html
https://linux.oracle.com/errata/ELSA-2018-4235.html
https://ubuntu.com/security/notices/USN-3443-1
https://ubuntu.com/security/notices/USN-3443-2
https://ubuntu.com/security/notices/USN-3443-3
https://ubuntu.com/security/notices/USN-3444-1
https://ubuntu.com/security/notices/USN-3444-2
https://ubuntu.com/security/notices/USN-3445-1
https://ubuntu.com/security/notices/USN-3445-2
https://www.mail-archive.com/netdev@vger.kernel.org/msg186255.html
| +| kernel-headers | CVE-2017-14489 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/101011
https://access.redhat.com/security/cve/CVE-2017-14489
https://bugzilla.redhat.com/show_bug.cgi?id=1490421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489
https://git.kernel.org/pub/scm/linux/kernel/git/jejb/scsi.git/commit/drivers/scsi/scsi_transport_iscsi.c?h=fixes&id=c88f0e6b06f4092995688211a631bb436125d77b
https://linux.oracle.com/cve/CVE-2017-14489.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://patchwork.kernel.org/patch/9923803/
https://ubuntu.com/security/notices/USN-3469-1
https://ubuntu.com/security/notices/USN-3469-2
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://www.exploit-db.com/exploits/42932/
| +| kernel-headers | CVE-2017-14497 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=edbd58be15a957f6a760c4a514cd475217eb97fd
http://seclists.org/oss-sec/2017/q3/476
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100871
http://www.securitytracker.com/id/1039371
http://www.securitytracker.com/id/1040106
https://access.redhat.com/security/cve/CVE-2017-14497
https://bugzilla.redhat.com/show_bug.cgi?id=1492593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14497
https://github.com/torvalds/linux/commit/edbd58be15a957f6a760c4a514cd475217eb97fd
https://marc.info/?l=linux-kernel&m=150394500728906&w=2
https://marc.info/?t=150394517700001&r=1&w=2
https://source.android.com/security/bulletin/2018-01-01
| +| kernel-headers | CVE-2017-15128 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e3921471354244f70fe268586ff94a97a6dd4df
http://post-office.corp.redhat.com/archives/rhkernel-list/2017-October/msg09574.html
https://access.redhat.com/security/cve/CVE-2017-15128
https://bugzilla.redhat.com/show_bug.cgi?id=1525222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15128
https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df
https://linux.oracle.com/cve/CVE-2017-15128.html
https://linux.oracle.com/errata/ELSA-2019-4850.html
https://marc.info/?l=linux-mm&m=150819356125109
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.12
| +| kernel-headers | CVE-2017-15129 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=21b5944350052d2583e82dd59b19a9ba94a007f0
http://seclists.org/oss-sec/2018/q1/7
http://www.securityfocus.com/bid/102485
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2019:1946
https://access.redhat.com/security/cve/CVE-2017-15129
https://bugzilla.redhat.com/show_bug.cgi?id=1531174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15129
https://git.kernel.org/linus/21b5944350052d2583e82dd59b19a9ba94a007f0
https://github.com/torvalds/linux/commit/21b5944350052d2583e82dd59b19a9ba94a007f0
https://linux.oracle.com/cve/CVE-2017-15129.html
https://linux.oracle.com/errata/ELSA-2018-4108.html
https://marc.info/?l=linux-netdev&m=151370451121029&w=2
https://marc.info/?t=151370468900001&r=1&w=2
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3632-1/
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
| +| kernel-headers | CVE-2017-15265 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026
http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
http://www.openwall.com/lists/oss-security/2017/10/11/3
http://www.securityfocus.com/bid/101288
http://www.securitytracker.com/id/1039561
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1130
https://access.redhat.com/errata/RHSA-2018:1170
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:3822
https://access.redhat.com/errata/RHSA-2018:3823
https://access.redhat.com/security/cve/CVE-2017-15265
https://bugzilla.suse.com/show_bug.cgi?id=1062520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265
https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2017-15265.html
https://linux.oracle.com/errata/ELSA-2018-2390.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://source.android.com/security/bulletin/2018-02-01
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3698-1
https://ubuntu.com/security/notices/USN-3698-2
https://usn.ubuntu.com/3698-1/
https://usn.ubuntu.com/3698-2/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
| +| kernel-headers | CVE-2017-15299 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/security/cve/CVE-2017-15299
https://bugzilla.redhat.com/show_bug.cgi?id=1498016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15299
https://linux.oracle.com/cve/CVE-2017-15299.html
https://linux.oracle.com/errata/ELSA-2018-4110.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://marc.info/?t=150654188100001&r=1&w=2
https://marc.info/?t=150783958600011&r=1&w=2
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3507-1
https://ubuntu.com/security/notices/USN-3507-2
https://ubuntu.com/security/notices/USN-3798-1
https://ubuntu.com/security/notices/USN-3798-2
https://usn.ubuntu.com/3798-1/
https://usn.ubuntu.com/3798-2/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1499828.html
| +| kernel-headers | CVE-2017-15306 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac64115a66c18c01745bbd3c47a36b124e5fd8c0
http://openwall.com/lists/oss-security/2017/11/06/6
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
http://www.securityfocus.com/bid/101693
https://access.redhat.com/security/cve/CVE-2017-15306
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15306
https://github.com/torvalds/linux/commit/ac64115a66c18c01745bbd3c47a36b124e5fd8c0
https://ubuntu.com/security/notices/USN-3507-1
https://ubuntu.com/security/notices/USN-3507-2
| +| kernel-headers | CVE-2017-16528 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16528
https://github.com/torvalds/linux/commit/fc27fe7e8deef2f37cba3f2be2d52b6ca5eb9d57
https://groups.google.com/d/msg/syzkaller/kuZzDHGkQu8/5du20rZEAAAJ
https://linux.oracle.com/cve/CVE-2017-16528.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
| +| kernel-headers | CVE-2017-16648 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://www.securityfocus.com/bid/101758
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2017-16648
https://groups.google.com/d/msg/syzkaller/0HJQqTm0G_g/T931ItskBAAJ
https://patchwork.kernel.org/patch/10046189/
| +| kernel-headers | CVE-2017-16994 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.11.0-44.6.1.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2
http://www.securityfocus.com/bid/101969
https://access.redhat.com/errata/RHSA-2018:0502
https://access.redhat.com/security/cve/CVE-2017-16994
https://bugs.chromium.org/p/project-zero/issues/detail?id=1431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16994
https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c
https://linux.oracle.com/cve/CVE-2017-16994.html
https://linux.oracle.com/errata/ELSA-2018-4108.html
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3632-1/
https://www.exploit-db.com/exploits/43178/
| +| kernel-headers | CVE-2017-17448 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...http://www.securityfocus.com/bid/102117
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/security/cve/CVE-2017-17448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
https://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf.git/commit/?id=4b380c42f7d00a395feede754f0bc2292eebe6e5
https://linux.oracle.com/cve/CVE-2017-17448.html
https://linux.oracle.com/errata/ELSA-2018-4110.html
https://patchwork.kernel.org/patch/10089373/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3620-1
https://ubuntu.com/security/notices/USN-3620-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
https://usn.ubuntu.com/3632-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
| +| kernel-headers | CVE-2017-17449 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...http://www.securityfocus.com/bid/102122
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1130
https://access.redhat.com/errata/RHSA-2018:1170
https://access.redhat.com/security/cve/CVE-2017-17449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=93c647643b48f0131f02e45da3bd367d80443291
https://linux.oracle.com/cve/CVE-2017-17449.html
https://linux.oracle.com/errata/ELSA-2018-4108.html
https://lkml.org/lkml/2017/12/5/950
https://source.android.com/security/bulletin/pixel/2018-04-01
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3653-1
https://ubuntu.com/security/notices/USN-3653-2
https://ubuntu.com/security/notices/USN-3655-1
https://ubuntu.com/security/notices/USN-3655-2
https://ubuntu.com/security/notices/USN-3657-1
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3653-1/
https://usn.ubuntu.com/3653-2/
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
https://usn.ubuntu.com/3657-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
| +| kernel-headers | CVE-2017-17805 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ecaaab5649781c5a0effdaf298a925063020500e
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
http://www.securityfocus.com/bid/102291
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2019:2473
https://access.redhat.com/security/cve/CVE-2017-17805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
https://github.com/torvalds/linux/commit/ecaaab5649781c5a0effdaf298a925063020500e
https://linux.oracle.com/cve/CVE-2017-17805.html
https://linux.oracle.com/errata/ELSA-2019-4316.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3620-1
https://ubuntu.com/security/notices/USN-3620-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
https://usn.ubuntu.com/3632-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
| +| kernel-headers | CVE-2017-17806 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=af3ff8045bbf3e32f1a448542e73abb4c8ceb6f1
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
http://www.securityfocus.com/bid/102293
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2017-17806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
https://github.com/torvalds/linux/commit/af3ff8045bbf3e32f1a448542e73abb4c8ceb6f1
https://linux.oracle.com/cve/CVE-2017-17806.html
https://linux.oracle.com/errata/ELSA-2019-4316.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3632-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
| +| kernel-headers | CVE-2017-17807 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4dca6ea1d9432052afb06baf2e3ae78188a4410b
http://www.securityfocus.com/bid/102301
https://access.redhat.com/security/cve/CVE-2017-17807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
https://github.com/torvalds/linux/commit/4dca6ea1d9432052afb06baf2e3ae78188a4410b
https://linux.oracle.com/cve/CVE-2017-17807.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3620-1
https://ubuntu.com/security/notices/USN-3620-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
https://usn.ubuntu.com/3632-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.6
| +| kernel-headers | CVE-2017-18075 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d76c68109f37cb85b243a1cf0f40313afd2bae68
http://www.securityfocus.com/bid/102813
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2017-18075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18075
https://github.com/torvalds/linux/commit/d76c68109f37cb85b243a1cf0f40313afd2bae68
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.13
| +| kernel-headers | CVE-2017-18079 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=340d394a789518018f834ff70f7534fc463d3226
http://www.securityfocus.com/bid/102895
https://access.redhat.com/security/cve/CVE-2017-18079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18079
https://github.com/torvalds/linux/commit/340d394a789518018f834ff70f7534fc463d3226
https://linux.oracle.com/cve/CVE-2017-18079.html
https://linux.oracle.com/errata/ELSA-2019-4317.html
https://ubuntu.com/security/notices/USN-3655-1
https://ubuntu.com/security/notices/USN-3655-2
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.4
| +| kernel-headers | CVE-2017-18203 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.16.1.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a41d21dceadf8104812626ef85dc56ee8a60ed
http://www.securityfocus.com/bid/103184
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2019:4154
https://access.redhat.com/security/cve/CVE-2017-18203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
https://github.com/torvalds/linux/commit/b9a41d21dceadf8104812626ef85dc56ee8a60ed
https://linux.oracle.com/cve/CVE-2017-18203.html
https://linux.oracle.com/errata/ELSA-2019-4742.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3653-1
https://ubuntu.com/security/notices/USN-3653-2
https://ubuntu.com/security/notices/USN-3655-1
https://ubuntu.com/security/notices/USN-3655-2
https://ubuntu.com/security/notices/USN-3657-1
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3653-1/
https://usn.ubuntu.com/3653-2/
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
https://usn.ubuntu.com/3657-1/
https://www.debian.org/security/2018/dsa-4187
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.3
| +| kernel-headers | CVE-2017-18208 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2019:3967
https://access.redhat.com/errata/RHSA-2019:4057
https://access.redhat.com/errata/RHSA-2019:4058
https://access.redhat.com/security/cve/CVE-2017-18208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18208
https://github.com/torvalds/linux/commit/6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91
https://linux.oracle.com/cve/CVE-2017-18208.html
https://linux.oracle.com/errata/ELSA-2019-4710.html
https://lwn.net/Articles/618064/
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3653-1
https://ubuntu.com/security/notices/USN-3653-2
https://ubuntu.com/security/notices/USN-3655-1
https://ubuntu.com/security/notices/USN-3655-2
https://ubuntu.com/security/notices/USN-3657-1
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3653-1/
https://usn.ubuntu.com/3653-2/
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
https://usn.ubuntu.com/3657-1/
https://www.kernel.org/doc/Documentation/filesystems/dax.txt
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.4
| +| kernel-headers | CVE-2017-18551 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.21.2.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2017-18551
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551
https://git.kernel.org/linus/89c6efa61f5709327ecfa24bff18e57a4e80c7fa
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa
https://linux.oracle.com/cve/CVE-2017-18551.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://support.f5.com/csp/article/K48073202?utm_source=f5support&utm_medium=RSS
| +| kernel-headers | CVE-2017-5972 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://seclists.org/oss-sec/2017/q1/573
http://www.securityfocus.com/bid/96231
https://access.redhat.com/security/cve/CVE-2017-5972
https://access.redhat.com/security/cve/cve-2017-5972
https://bugzilla.redhat.com/show_bug.cgi?id=1422081
https://cxsecurity.com/issue/WLB-2017020112
https://githubengineering.com/syn-flood-mitigation-with-synsanity/
https://packetstormsecurity.com/files/141083/CentOS7-Kernel-Denial-Of-Service.html
https://security-tracker.debian.org/tracker/CVE-2017-5972
https://www.exploit-db.com/exploits/41350/
| +| kernel-headers | CVE-2017-7541 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f44c9a41386729fea410e688959ddaa9d51be7c
http://openwall.com/lists/oss-security/2017/07/24/2
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.3
http://www.securityfocus.com/bid/99955
http://www.securitytracker.com/id/1038981
https://access.redhat.com/errata/RHSA-2017:2863
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/security/cve/CVE-2017-7541
https://bugzilla.novell.com/show_bug.cgi?id=1049645
https://bugzilla.redhat.com/show_bug.cgi?id=1473198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541
https://github.com/torvalds/linux/commit/8f44c9a41386729fea410e688959ddaa9d51be7c
https://linux.oracle.com/cve/CVE-2017-7541.html
https://linux.oracle.com/errata/ELSA-2017-3629.html
https://source.android.com/security/bulletin/2017-11-01
https://ubuntu.com/security/notices/USN-3405-1
https://ubuntu.com/security/notices/USN-3405-2
https://ubuntu.com/security/notices/USN-3419-1
https://ubuntu.com/security/notices/USN-3419-2
https://ubuntu.com/security/notices/USN-3422-1
https://ubuntu.com/security/notices/USN-3422-2
https://www.spinics.net/lists/stable/msg180994.html
| +| kernel-headers | CVE-2017-7542 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6399f1fae4ec29fab5ec76070435555e256ca3a6
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.securityfocus.com/bid/99953
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2018:0169
https://access.redhat.com/security/cve/CVE-2017-7542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542
https://github.com/torvalds/linux/commit/6399f1fae4ec29fab5ec76070435555e256ca3a6
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2017-7542.html
https://linux.oracle.com/errata/ELSA-2018-0169.html
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
| +| kernel-headers | CVE-2017-7558 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://seclists.org/oss-sec/2017/q3/338
http://www.securityfocus.com/bid/100466
http://www.securitytracker.com/id/1039221
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/security/cve/CVE-2017-7558
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7558
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/sctp/socket.c?id=ee6c88bb754e3d363e568da78086adfedb692447
https://linux.oracle.com/cve/CVE-2017-7558.html
https://linux.oracle.com/errata/ELSA-2017-2930.html
https://marc.info/?l=linux-netdev&m=150348777122761&w=2
https://www.debian.org/security/2017/dsa-3981
| +| kernel-headers | CVE-2017-9211 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9933e113c2e87a9f46a40fde8dafbf801dca1ab9
https://access.redhat.com/security/cve/CVE-2017-9211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9211
https://git.kernel.org/linus/9933e113c2e87a9f46a40fde8dafbf801dca1ab9
https://github.com/torvalds/linux/commit/9933e113c2e87a9f46a40fde8dafbf801dca1ab9
https://patchwork.kernel.org/patch/9718933/
| +| kernel-headers | CVE-2018-1000004 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...http://seclists.org/oss-sec/2018/q1/51
http://www.openwall.com/lists/oss-security/2018/01/16/1
http://www.securityfocus.com/bid/104606
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2019:1483
https://access.redhat.com/security/cve/CVE-2018-1000004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
https://github.com/torvalds/linux/commit/b3defb791b26ea0683a93a4f49c77ec45ec96f10
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-1000004.html
https://linux.oracle.com/errata/ELSA-2019-4317.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://ubuntu.com/security/notices/USN-3631-1
https://ubuntu.com/security/notices/USN-3631-2
https://ubuntu.com/security/notices/USN-3798-1
https://ubuntu.com/security/notices/USN-3798-2
https://usn.ubuntu.com/3631-1/
https://usn.ubuntu.com/3631-2/
https://usn.ubuntu.com/3798-1/
https://usn.ubuntu.com/3798-2/
https://www.debian.org/security/2018/dsa-4187
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
| +| kernel-headers | CVE-2018-1000026 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://lists.openwall.net/netdev/2018/01/16/40
http://lists.openwall.net/netdev/2018/01/18/96
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-1000026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000026
https://git.kernel.org/linus/2b16f048729bf35e6c28a40cbfad07239f9dcd90
https://git.kernel.org/linus/8914a595110a6eca69a5e275b323f5d09e18f4f9
https://linux.oracle.com/cve/CVE-2018-1000026.html
https://linux.oracle.com/errata/ELSA-2021-9534.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1000026
https://patchwork.ozlabs.org/patch/859410/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3620-1
https://ubuntu.com/security/notices/USN-3620-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
https://usn.ubuntu.com/3632-1/
| +| kernel-headers | CVE-2018-1000200 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://openwall.com/lists/oss-security/2018/04/24/3
http://seclists.org/oss-sec/2018/q2/67
http://www.securityfocus.com/bid/104397
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2018-1000200
https://access.redhat.com/security/cve/cve-2018-1000200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000200
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=27ae357fa82be5ab73b2ef8d39dcb8ca2563483a
https://marc.info/?l=linux-kernel&m=152400522806945
https://marc.info/?l=linux-kernel&m=152460926619256
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
| +| kernel-headers | CVE-2018-1065 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=57ebd808a97d7c5b1e1afb937c2db22beba3c1f8
http://lists.openwall.net/netdev/2018/01/27/46
http://patchwork.ozlabs.org/patch/870355/
http://www.securitytracker.com/id/1040446
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2018-1065
https://bugzilla.redhat.com/show_bug.cgi?id=1547824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8
https://ubuntu.com/security/notices/USN-3654-1
https://ubuntu.com/security/notices/USN-3654-2
https://ubuntu.com/security/notices/USN-3656-1
https://usn.ubuntu.com/3654-1/
https://usn.ubuntu.com/3654-2/
https://usn.ubuntu.com/3656-1/
https://www.debian.org/security/2018/dsa-4188
| +| kernel-headers | CVE-2018-10840 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.5.1.el7a |
Expand...http://www.securityfocus.com/bid/104858
https://access.redhat.com/errata/RHSA-2019:0162
https://access.redhat.com/security/cve/CVE-2018-10840
https://bugzilla.kernel.org/show_bug.cgi?id=199347
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10840
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
| +| kernel-headers | CVE-2018-10878 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://patchwork.ozlabs.org/patch/929237/
http://patchwork.ozlabs.org/patch/929238/
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-10878
https://bugzilla.kernel.org/show_bug.cgi?id=199865
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10878
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=77260807d1170a8cf35dbb06e07461a655f67eee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=819b23f1c501b17b9694325471789e6b5cc2d0d2
https://linux.oracle.com/cve/CVE-2018-10878.html
https://linux.oracle.com/errata/ELSA-2019-4576.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://ubuntu.com/security/notices/USN-3753-1
https://ubuntu.com/security/notices/USN-3753-2
https://ubuntu.com/security/notices/USN-3871-1
https://ubuntu.com/security/notices/USN-3871-3
https://ubuntu.com/security/notices/USN-3871-4
https://ubuntu.com/security/notices/USN-3871-5
https://usn.ubuntu.com/3753-1/
https://usn.ubuntu.com/3753-2/
https://usn.ubuntu.com/3871-1/
https://usn.ubuntu.com/3871-3/
https://usn.ubuntu.com/3871-4/
https://usn.ubuntu.com/3871-5/
| +| kernel-headers | CVE-2018-1120 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.openwall.com/lists/oss-security/2018/05/17/1
http://www.securityfocus.com/bid/104229
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-1120
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1120
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f7ccc2ccc2e70c6054685f5e3522efa81556830
https://linux.oracle.com/cve/CVE-2018-1120.html
https://linux.oracle.com/errata/ELSA-2018-3083.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://security.gentoo.org/glsa/201805-14
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://ubuntu.com/security/notices/USN-3910-1
https://ubuntu.com/security/notices/USN-3910-2
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
https://usn.ubuntu.com/3910-1/
https://usn.ubuntu.com/3910-2/
https://www.exploit-db.com/exploits/44806/
| +| kernel-headers | CVE-2018-11412 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.6.1.el7a |
Expand...http://www.securityfocus.com/bid/104291
https://access.redhat.com/errata/RHSA-2019:0525
https://access.redhat.com/security/cve/CVE-2018-11412
https://bugs.chromium.org/p/project-zero/issues/detail?id=1580
https://bugzilla.kernel.org/show_bug.cgi?id=199803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11412
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
https://www.exploit-db.com/exploits/44832/
| +| kernel-headers | CVE-2018-11506 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f7068114d45ec55996b9040e98111afa56e010fe
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2018-11506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11506
https://github.com/torvalds/linux/commit/f7068114d45ec55996b9040e98111afa56e010fe
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://twitter.com/efrmv/status/1001574894273007616
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
| +| kernel-headers | CVE-2018-12232 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6d8c50dcb029872b298eea68cc6209c866fd3e14
http://www.securityfocus.com/bid/104453
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2018-12232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12232
https://github.com/torvalds/linux/commit/6d8c50dcb029872b298eea68cc6209c866fd3e14
https://lkml.org/lkml/2018/6/5/14
https://patchwork.ozlabs.org/patch/926519/
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
| +| kernel-headers | CVE-2018-14625 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.16.1.el7a |
Expand...https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2019:4154
https://access.redhat.com/security/cve/CVE-2018-14625
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14625
https://linux.oracle.com/cve/CVE-2018-14625.html
https://linux.oracle.com/errata/ELSA-2019-2029.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
https://lore.kernel.org/lkml/000000000000b4f77905723b70ee@google.com/
https://lore.kernel.org/lkml/?q=%22syzbot%2Bbd391451452fb0b93039%40syzkaller.appspotmail.com%22
https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039
https://ubuntu.com/security/notices/USN-3871-1
https://ubuntu.com/security/notices/USN-3871-3
https://ubuntu.com/security/notices/USN-3871-4
https://ubuntu.com/security/notices/USN-3871-5
https://ubuntu.com/security/notices/USN-3872-1
https://ubuntu.com/security/notices/USN-3878-1
https://ubuntu.com/security/notices/USN-3878-2
https://usn.ubuntu.com/3871-1/
https://usn.ubuntu.com/3871-3/
https://usn.ubuntu.com/3871-4/
https://usn.ubuntu.com/3871-5/
https://usn.ubuntu.com/3872-1/
https://usn.ubuntu.com/3878-1/
https://usn.ubuntu.com/3878-2/
| +| kernel-headers | CVE-2018-14734 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.7.1.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb2595c1393b4a5211534e6f0a0fbad369e21ad8
https://access.redhat.com/errata/RHSA-2019:0831
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/security/cve/CVE-2018-14734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14734
https://git.kernel.org/linus/cb2595c1393b4a5211534e6f0a0fbad369e21ad8 (4.18-rc1)
https://github.com/torvalds/linux/commit/cb2595c1393b4a5211534e6f0a0fbad369e21ad8
https://linux.oracle.com/cve/CVE-2018-14734.html
https://linux.oracle.com/errata/ELSA-2019-2029.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
https://ubuntu.com/security/notices/USN-3797-1
https://ubuntu.com/security/notices/USN-3797-2
https://ubuntu.com/security/notices/USN-3847-1
https://ubuntu.com/security/notices/USN-3847-2
https://ubuntu.com/security/notices/USN-3847-3
https://ubuntu.com/security/notices/USN-3849-1
https://ubuntu.com/security/notices/USN-3849-2
https://usn.ubuntu.com/3797-1/
https://usn.ubuntu.com/3797-2/
https://usn.ubuntu.com/3847-1/
https://usn.ubuntu.com/3847-2/
https://usn.ubuntu.com/3847-3/
https://usn.ubuntu.com/3849-1/
https://usn.ubuntu.com/3849-2/
https://www.debian.org/security/2018/dsa-4308
| +| kernel-headers | CVE-2018-16871 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.18.1.el7a |
Expand...https://access.redhat.com/errata/RHSA-2019:2696
https://access.redhat.com/errata/RHSA-2019:2730
https://access.redhat.com/errata/RHSA-2020:0740
https://access.redhat.com/security/cve/CVE-2018-16871
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16871
https://git.kernel.org/linus/01310bb7c9c98752cc763b36532fab028e0f8f81
https://linux.oracle.com/cve/CVE-2018-16871.html
https://linux.oracle.com/errata/ELSA-2020-1769.html
https://security.netapp.com/advisory/ntap-20211004-0002/
https://support.f5.com/csp/article/K18657134
https://support.f5.com/csp/article/K18657134?utm_source=f5support&utm_medium=RSS
| +| kernel-headers | CVE-2018-17972 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.7.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
http://www.securityfocus.com/bid/105525
https://access.redhat.com/errata/RHSA-2019:0512
https://access.redhat.com/errata/RHSA-2019:0514
https://access.redhat.com/errata/RHSA-2019:0831
https://access.redhat.com/errata/RHSA-2019:2473
https://access.redhat.com/security/cve/CVE-2018-17972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17972
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=680d86b71ff9779f770758eaf9cadee98465223c
https://linux.oracle.com/cve/CVE-2018-17972.html
https://linux.oracle.com/errata/ELSA-2019-4577.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://lore.kernel.org/patchwork/patch/992734/
https://marc.info/?l=linux-fsdevel&m=153806242024956&w=2
https://support.f5.com/csp/article/K27673650?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3821-1
https://ubuntu.com/security/notices/USN-3821-2
https://ubuntu.com/security/notices/USN-3832-1
https://ubuntu.com/security/notices/USN-3835-1
https://ubuntu.com/security/notices/USN-3871-1
https://ubuntu.com/security/notices/USN-3871-3
https://ubuntu.com/security/notices/USN-3871-4
https://ubuntu.com/security/notices/USN-3871-5
https://ubuntu.com/security/notices/USN-3880-1
https://ubuntu.com/security/notices/USN-3880-2
https://usn.ubuntu.com/3821-1/
https://usn.ubuntu.com/3821-2/
https://usn.ubuntu.com/3832-1/
https://usn.ubuntu.com/3835-1/
https://usn.ubuntu.com/3871-1/
https://usn.ubuntu.com/3871-3/
https://usn.ubuntu.com/3871-4/
https://usn.ubuntu.com/3871-5/
https://usn.ubuntu.com/3880-1/
https://usn.ubuntu.com/3880-2/
| +| kernel-headers | CVE-2018-17977 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/105539
https://access.redhat.com/security/cve/CVE-2018-17977
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| +| kernel-headers | CVE-2018-18281 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.7.1.el7a |
Expand...http://packetstormsecurity.com/files/150001/Linux-mremap-TLB-Flush-Too-Late.html
http://www.openwall.com/lists/oss-security/2018/10/29/5
http://www.securityfocus.com/bid/105761
http://www.securityfocus.com/bid/106503
https://access.redhat.com/errata/RHSA-2019:0831
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2020:0036
https://access.redhat.com/errata/RHSA-2020:0100
https://access.redhat.com/errata/RHSA-2020:0103
https://access.redhat.com/errata/RHSA-2020:0179
https://access.redhat.com/security/cve/CVE-2018-18281
https://bugs.chromium.org/p/project-zero/issues/detail?id=1695
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.78
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.16
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18281
https://git.kernel.org/linus/eb66ae030829605d61fbef1909ce310e29f78821
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eb66ae030829605d61fbef1909ce310e29f78821
https://linux.oracle.com/cve/CVE-2018-18281.html
https://linux.oracle.com/errata/ELSA-2020-5708.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://ubuntu.com/security/notices/USN-3832-1
https://ubuntu.com/security/notices/USN-3835-1
https://ubuntu.com/security/notices/USN-3871-1
https://ubuntu.com/security/notices/USN-3871-3
https://ubuntu.com/security/notices/USN-3871-4
https://ubuntu.com/security/notices/USN-3871-5
https://ubuntu.com/security/notices/USN-3880-1
https://ubuntu.com/security/notices/USN-3880-2
https://usn.ubuntu.com/3832-1/
https://usn.ubuntu.com/3835-1/
https://usn.ubuntu.com/3871-1/
https://usn.ubuntu.com/3871-3/
https://usn.ubuntu.com/3871-4/
https://usn.ubuntu.com/3871-5/
https://usn.ubuntu.com/3880-1/
https://usn.ubuntu.com/3880-2/
| +| kernel-headers | CVE-2018-18386 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.7.1.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=966031f340185eddd05affcf72b740549f056348
https://access.redhat.com/errata/RHSA-2019:0831
https://access.redhat.com/security/cve/CVE-2018-18386
https://bugzilla.suse.com/show_bug.cgi?id=1094825
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18386
https://github.com/torvalds/linux/commit/966031f340185eddd05affcf72b740549f056348
https://linux.oracle.com/cve/CVE-2018-18386.html
https://linux.oracle.com/errata/ELSA-2018-4307.html
https://ubuntu.com/security/notices/USN-3849-1
https://ubuntu.com/security/notices/USN-3849-2
https://usn.ubuntu.com/3849-1/
https://usn.ubuntu.com/3849-2/
| +| kernel-headers | CVE-2018-18397 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.7.1.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1
https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2019:0163
https://access.redhat.com/errata/RHSA-2019:0202
https://access.redhat.com/errata/RHSA-2019:0324
https://access.redhat.com/errata/RHSA-2019:0831
https://access.redhat.com/security/cve/CVE-2018-18397
https://bugs.chromium.org/p/project-zero/issues/detail?id=1700
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.87
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18397
https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1
https://linux.oracle.com/cve/CVE-2018-18397.html
https://linux.oracle.com/errata/ELSA-2019-4541.html
https://lore.kernel.org/lkml/20181126173452.26955-2-aarcange@redhat.com/
https://ubuntu.com/security/notices/USN-3901-1
https://ubuntu.com/security/notices/USN-3901-2
https://ubuntu.com/security/notices/USN-3903-1
https://ubuntu.com/security/notices/USN-3903-2
https://usn.ubuntu.com/3901-1/
https://usn.ubuntu.com/3901-2/
https://usn.ubuntu.com/3903-1/
https://usn.ubuntu.com/3903-2/
| +| kernel-headers | CVE-2018-20169 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=704620afc70cf47abb9d6a1a57f3825d2bca49cf
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/CVE-2018-20169
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169
https://git.kernel.org/linus/704620afc70cf47abb9d6a1a57f3825d2bca49cf
https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf
https://linux.oracle.com/cve/CVE-2018-20169.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
https://ubuntu.com/security/notices/USN-3879-1
https://ubuntu.com/security/notices/USN-3879-2
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/3879-1/
https://usn.ubuntu.com/3879-2/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4118-1/
| +| kernel-headers | CVE-2018-20836 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
http://www.securityfocus.com/bid/108196
https://access.redhat.com/security/cve/CVE-2018-20836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b90cd6f2b905905fb42671009dc0e27c310a16ae
https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae
https://linux.oracle.com/cve/CVE-2018-20836.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://security.netapp.com/advisory/ntap-20190719-0003/
https://support.f5.com/csp/article/K11225249
https://ubuntu.com/security/notices/USN-4076-1
https://usn.ubuntu.com/4076-1/
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
| +| kernel-headers | CVE-2018-5344 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5
http://www.securityfocus.com/bid/102503
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-5344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5344
https://github.com/torvalds/linux/commit/ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5
https://linux.oracle.com/cve/CVE-2018-5344.html
https://linux.oracle.com/errata/ELSA-2018-3083.html
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3632-1/
| +| kernel-headers | CVE-2018-5750 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://www.securitytracker.com/id/1040319
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2018-5750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
https://linux.oracle.com/cve/CVE-2018-5750.html
https://linux.oracle.com/errata/ELSA-2019-4742.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://patchwork.kernel.org/patch/10174835/
https://ubuntu.com/security/notices/USN-3631-1
https://ubuntu.com/security/notices/USN-3631-2
https://ubuntu.com/security/notices/USN-3697-1
https://ubuntu.com/security/notices/USN-3697-2
https://ubuntu.com/security/notices/USN-3698-1
https://ubuntu.com/security/notices/USN-3698-2
https://usn.ubuntu.com/3631-1/
https://usn.ubuntu.com/3631-2/
https://usn.ubuntu.com/3697-1/
https://usn.ubuntu.com/3697-2/
https://usn.ubuntu.com/3698-1/
https://usn.ubuntu.com/3698-2/
https://www.debian.org/security/2018/dsa-4120
https://www.debian.org/security/2018/dsa-4187
| +| kernel-headers | CVE-2018-5803 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...https://access.redhat.com/errata/RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-5803
https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
https://git.kernel.org/linus/07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c
https://linux.oracle.com/cve/CVE-2018-5803.html
https://linux.oracle.com/errata/ELSA-2018-4164.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://secuniaresearch.flexerasoftware.com/advisories/81331/
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/
https://ubuntu.com/security/notices/USN-3654-1
https://ubuntu.com/security/notices/USN-3654-2
https://ubuntu.com/security/notices/USN-3656-1
https://ubuntu.com/security/notices/USN-3697-1
https://ubuntu.com/security/notices/USN-3697-2
https://ubuntu.com/security/notices/USN-3698-1
https://ubuntu.com/security/notices/USN-3698-2
https://usn.ubuntu.com/3654-1/
https://usn.ubuntu.com/3654-2/
https://usn.ubuntu.com/3656-1/
https://usn.ubuntu.com/3697-1/
https://usn.ubuntu.com/3697-2/
https://usn.ubuntu.com/3698-1/
https://usn.ubuntu.com/3698-2/
https://www.debian.org/security/2018/dsa-4187
https://www.debian.org/security/2018/dsa-4188
https://www.spinics.net/lists/linux-sctp/msg07036.html
https://www.spinics.net/lists/netdev/msg482523.html
| +| kernel-headers | CVE-2018-5848 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-5848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5848
https://linux.oracle.com/cve/CVE-2018-5848.html
https://linux.oracle.com/errata/ELSA-2019-4509.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://source.android.com/security/bulletin/pixel/2018-05-01
https://www.codeaurora.org/security-bulletin/2018/05/11/may-2018-code-aurora-security-bulletin-2
| +| kernel-headers | CVE-2018-7191 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108380
https://access.redhat.com/security/cve/CVE-2018-7191
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1743792
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1748846
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.14
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ad646c81b2182f7fa67ec0c8c825e0ee165696d
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c25f65fd1e42685f7ccd80e0621829c105785d9
https://git.kernel.org/linus/0ad646c81b2182f7fa67ec0c8c825e0ee165696d
https://git.kernel.org/linus/5c25f65fd1e42685f7ccd80e0621829c105785d9
https://github.com/torvalds/linux/commit/0ad646c81b2182f7fa67ec0c8c825e0ee165696d
https://github.com/torvalds/linux/commit/5c25f65fd1e42685f7ccd80e0621829c105785d9
https://linux.oracle.com/cve/CVE-2018-7191.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
| +| kernel-headers | CVE-2018-7566 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html
http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html
http://www.securityfocus.com/bid/103605
https://access.redhat.com/errata/RHSA-2018:2384
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:2395
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2019:1483
https://access.redhat.com/errata/RHSA-2019:1487
https://access.redhat.com/security/cve/CVE-2018-7566
https://bugzilla.redhat.com/show_bug.cgi?id=1550142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-7566.html
https://linux.oracle.com/errata/ELSA-2018-4301.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://ubuntu.com/security/notices/USN-3631-1
https://ubuntu.com/security/notices/USN-3631-2
https://ubuntu.com/security/notices/USN-3798-1
https://ubuntu.com/security/notices/USN-3798-2
https://usn.ubuntu.com/3631-1/
https://usn.ubuntu.com/3631-2/
https://usn.ubuntu.com/3798-1/
https://usn.ubuntu.com/3798-2/
https://www.debian.org/security/2018/dsa-4187
https://www.debian.org/security/2018/dsa-4188
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
| +| kernel-headers | CVE-2018-9363 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/security/cve/CVE-2018-9363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9363
https://github.com/LineageOS/android_kernel_samsung_exynos5420/commit/22db4bea2a0af7c0e188533282ce7e42323b6e58
https://linux.oracle.com/cve/CVE-2018-9363.html
https://linux.oracle.com/errata/ELSA-2019-4315.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
https://source.android.com/security/bulletin/2018-06-01
https://ubuntu.com/security/notices/USN-3797-1
https://ubuntu.com/security/notices/USN-3797-2
https://ubuntu.com/security/notices/USN-3820-1
https://ubuntu.com/security/notices/USN-3820-2
https://ubuntu.com/security/notices/USN-3820-3
https://ubuntu.com/security/notices/USN-3822-1
https://ubuntu.com/security/notices/USN-3822-2
https://usn.ubuntu.com/3797-1/
https://usn.ubuntu.com/3797-2/
https://usn.ubuntu.com/3820-1/
https://usn.ubuntu.com/3820-2/
https://usn.ubuntu.com/3820-3/
https://usn.ubuntu.com/3822-1/
https://usn.ubuntu.com/3822-2/
https://www.debian.org/security/2018/dsa-4308
| +| kernel-headers | CVE-2019-10207 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-10207
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
https://linux.oracle.com/cve/CVE-2019-10207.html
https://linux.oracle.com/errata/ELSA-2021-9534.html
https://lore.kernel.org/linux-bluetooth/20190729122215.9948-1-vdronov@redhat.com/
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4145-1
https://ubuntu.com/security/notices/USN-4147-1
https://www.openwall.com/lists/oss-security/2019/07/25/1
| +| kernel-headers | CVE-2019-11478 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.8.2.el7a |
Expand...http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
http://www.openwall.com/lists/oss-security/2019/10/24/1
http://www.openwall.com/lists/oss-security/2019/10/29/3
http://www.vmware.com/security/advisories/VMSA-2019-0010.html
https://access.redhat.com/errata/RHSA-2019:1594
https://access.redhat.com/errata/RHSA-2019:1602
https://access.redhat.com/errata/RHSA-2019:1699
https://access.redhat.com/security/cve/CVE-2019-11478
https://access.redhat.com/security/vulnerabilities/tcpsack
https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
https://kc.mcafee.com/corporate/index?page=content&id=SB10287
https://linux.oracle.com/cve/CVE-2019-11478.html
https://linux.oracle.com/errata/ELSA-2019-4850.html
https://patchwork.ozlabs.org/project/netdev/list/?series=114310
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0007
https://seclists.org/bugtraq/2019/Jul/30
https://security.netapp.com/advisory/ntap-20190625-0001/
https://support.f5.com/csp/article/K26618426
https://ubuntu.com/security/notices/USN-4017-1
https://ubuntu.com/security/notices/USN-4017-2
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
https://www.kb.cert.org/vuls/id/905115
https://www.openwall.com/lists/oss-security/2019/06/17/5
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.synology.com/security/advisory/Synology_SA_19_28
https://www.us-cert.gov/ics/advisories/icsa-19-253-03
| +| kernel-headers | CVE-2019-11479 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.8.2.el7a |
Expand...http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
http://www.securityfocus.com/bid/108818
https://access.redhat.com/errata/RHSA-2019:1594
https://access.redhat.com/errata/RHSA-2019:1602
https://access.redhat.com/errata/RHSA-2019:1699
https://access.redhat.com/security/cve/CVE-2019-11479
https://access.redhat.com/security/vulnerabilities/tcpsack
https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=5f3e2bf008c2221478101ee72f5cb4654b9fc363
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
https://kc.mcafee.com/corporate/index?page=content&id=SB10287
https://linux.oracle.com/cve/CVE-2019-11479.html
https://linux.oracle.com/errata/ELSA-2019-4689.html
https://patchwork.ozlabs.org/project/netdev/list/?series=114310
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0008
https://security.netapp.com/advisory/ntap-20190625-0001/
https://support.f5.com/csp/article/K35421172
https://support.f5.com/csp/article/K35421172?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4041-1
https://ubuntu.com/security/notices/USN-4041-2
https://usn.ubuntu.com/4041-1/
https://usn.ubuntu.com/4041-2/
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
https://www.kb.cert.org/vuls/id/905115
https://www.openwall.com/lists/oss-security/2019/06/17/5
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.synology.com/security/advisory/Synology_SA_19_28
https://www.us-cert.gov/ics/advisories/icsa-19-253-03
https://www.us-cert.gov/ics/advisories/icsma-20-170-06
| +| kernel-headers | CVE-2019-11810 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.14.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html
http://www.securityfocus.com/bid/108286
https://access.redhat.com/errata/RHSA-2019:1959
https://access.redhat.com/errata/RHSA-2019:1971
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2019:2736
https://access.redhat.com/errata/RHSA-2019:2837
https://access.redhat.com/errata/RHSA-2019:3217
https://access.redhat.com/errata/RHSA-2020:0036
https://access.redhat.com/security/cve/CVE-2019-11810
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bcf3b67d16a4c8ffae0aa79de5853435e683945c
https://github.com/torvalds/linux/commit/bcf3b67d16a4c8ffae0aa79de5853435e683945c
https://linux.oracle.com/cve/CVE-2019-11810.html
https://linux.oracle.com/errata/ELSA-2019-4685.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
https://security.netapp.com/advisory/ntap-20190719-0003/
https://support.f5.com/csp/article/K50484570
https://ubuntu.com/security/notices/USN-4005-1
https://ubuntu.com/security/notices/USN-4008-1
https://ubuntu.com/security/notices/USN-4008-3
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4005-1/
https://usn.ubuntu.com/4008-1/
https://usn.ubuntu.com/4008-3/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
| +| kernel-headers | CVE-2019-11811 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.26.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html
http://www.securityfocus.com/bid/108410
https://access.redhat.com/errata/RHSA-2019:1873
https://access.redhat.com/errata/RHSA-2019:1891
https://access.redhat.com/errata/RHSA-2019:1959
https://access.redhat.com/errata/RHSA-2019:1971
https://access.redhat.com/errata/RHSA-2019:4057
https://access.redhat.com/errata/RHSA-2019:4058
https://access.redhat.com/errata/RHSA-2020:0036
https://access.redhat.com/security/cve/CVE-2019-11811
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11811
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=401e7e88d4ef80188ffa07095ac00456f901b8c4
https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4
https://linux.oracle.com/cve/CVE-2019-11811.html
https://linux.oracle.com/errata/ELSA-2019-1959.html
https://security.netapp.com/advisory/ntap-20190719-0003/
https://support.f5.com/csp/article/K01512680
| +| kernel-headers | CVE-2019-11884 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.18.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html
http://www.securityfocus.com/bid/108299
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/errata/RHSA-2020:0740
https://access.redhat.com/security/cve/CVE-2019-11884
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1616a5ac99ede5d605047a9012481ce7ff18b16
https://git.kernel.org/linus/a1616a5ac99ede5d605047a9012481ce7ff18b16
https://github.com/torvalds/linux/commit/a1616a5ac99ede5d605047a9012481ce7ff18b16
https://linux.oracle.com/cve/CVE-2019-11884.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPWHQHNM2MSGO3FDJVIQXQNKYVR7TV45/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAYXGGJUUYPOMCBZGGDCUZFLUU3JOZG5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF2PDXUGOFEOTPVEACKFIHQB6O4XUIZD/
https://seclists.org/bugtraq/2019/Jun/26
https://ubuntu.com/security/notices/USN-4068-1
https://ubuntu.com/security/notices/USN-4068-2
https://ubuntu.com/security/notices/USN-4069-1
https://ubuntu.com/security/notices/USN-4069-2
https://ubuntu.com/security/notices/USN-4076-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4068-1/
https://usn.ubuntu.com/4068-2/
https://usn.ubuntu.com/4069-1/
https://usn.ubuntu.com/4069-2/
https://usn.ubuntu.com/4076-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4465
| +| kernel-headers | CVE-2019-12382 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108474
https://access.redhat.com/security/cve/CVE-2019-12382
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://linux.oracle.com/cve/CVE-2019-12382.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/24/843
https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/
https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
| +| kernel-headers | CVE-2019-13233 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/CVE-2019-13233
https://bugs.chromium.org/p/project-zero/issues/detail?id=1879
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de9f869616dd95e95c00bdd6b0fcd3421e8a4323
https://github.com/torvalds/linux/commit/de9f869616dd95e95c00bdd6b0fcd3421e8a4323
https://linux.oracle.com/cve/CVE-2019-13233.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://seclists.org/bugtraq/2019/Aug/13
https://security.netapp.com/advisory/ntap-20190806-0001/
https://support.f5.com/csp/article/K13331647?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4093-1
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4093-1/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4495
| +| kernel-headers | CVE-2019-13631 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html
http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.securityfocus.com/bid/109291
https://access.redhat.com/security/cve/CVE-2019-13631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
https://linux.oracle.com/cve/CVE-2019-13631.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQ5BQKTI24DPSVKPOIMMGDTFKCF6ASXT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUXTJSLIQBOJTQDMTUQTQKUWWAJLFVEY/
https://patchwork.kernel.org/patch/11040813/
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Aug/26
https://security.netapp.com/advisory/ntap-20190806-0001/
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4145-1
https://ubuntu.com/security/notices/USN-4147-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4145-1/
https://usn.ubuntu.com/4147-1/
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
| +| kernel-headers | CVE-2019-13648 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html
http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/07/30/1
https://access.redhat.com/security/cve/CVE-2019-13648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
https://git.kernel.org/torvalds/c/f16d80b75a096c52354c6e0a574993f3b0dfbdfe
https://linux.oracle.com/cve/CVE-2019-13648.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GRK2MW223KQZ76DKEF2BZFN6TCXLZLDS/
https://patchwork.ozlabs.org/patch/1133904/
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Aug/26
https://security.netapp.com/advisory/ntap-20190806-0001/
https://ubuntu.com/security/notices/USN-4114-1
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4116-1
https://usn.ubuntu.com/4114-1/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4116-1/
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
| +| kernel-headers | CVE-2019-14283 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...Changelog
Upstream commit
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html
http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
https://access.redhat.com/security/cve/CVE-2019-14283
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=da99466ac243f15fbba65bd261bfc75ffa1532b6
https://git.kernel.org/linus/da99466ac243f15fbba65bd261bfc75ffa1532b6
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=da99466ac243f15fbba65bd261bfc75ffa1532b6
https://github.com/torvalds/linux/commit/da99466ac243f15fbba65bd261bfc75ffa1532b6
https://linux.oracle.com/cve/CVE-2019-14283.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Aug/26
https://security.netapp.com/advisory/ntap-20190905-0002/
https://ubuntu.com/security/notices/USN-4114-1
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4116-1
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4114-1/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4116-1/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
| +| kernel-headers | CVE-2019-14284 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html
http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
https://access.redhat.com/security/cve/CVE-2019-14284
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32
https://git.kernel.org/linus/f3554aeb991214cbfafd17d55e2bfddb50282e32
https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32
https://linux.oracle.com/cve/CVE-2019-14284.html
https://linux.oracle.com/errata/ELSA-2019-4855.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Aug/26
https://security.netapp.com/advisory/ntap-20190905-0002/
https://ubuntu.com/security/notices/USN-4114-1
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4116-1
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4114-1/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4116-1/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
| +| kernel-headers | CVE-2019-14615 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html
http://seclists.org/fulldisclosure/2020/Mar/31
https://access.redhat.com/security/cve/CVE-2019-14615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14615
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc8a76a152c5f9ef3b48104154a65a68a8b76946
https://linux.oracle.com/cve/CVE-2019-14615.html
https://linux.oracle.com/errata/ELSA-2020-5569.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://support.apple.com/kb/HT211100
https://ubuntu.com/security/notices/USN-4253-1
https://ubuntu.com/security/notices/USN-4253-2
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4255-1
https://ubuntu.com/security/notices/USN-4255-2
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4253-1/
https://usn.ubuntu.com/4253-2/
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4255-1/
https://usn.ubuntu.com/4255-2/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html
| +| kernel-headers | CVE-2019-14814 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.17.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/08/28/1
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/errata/RHSA-2020:0328
https://access.redhat.com/errata/RHSA-2020:0339
https://access.redhat.com/security/cve/CVE-2019-14814
https://access.redhat.com/security/cve/cve-2019-14814
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14814
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a
https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a
https://linux.oracle.com/cve/CVE-2019-14814.html
https://linux.oracle.com/errata/ELSA-2020-5676.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
https://lore.kernel.org/linux-wireless/20190828020751.13625-1-huangwenabc@gmail.com/
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20191031-0005/
https://ubuntu.com/security/notices/USN-4157-1
https://ubuntu.com/security/notices/USN-4157-2
https://ubuntu.com/security/notices/USN-4162-1
https://ubuntu.com/security/notices/USN-4162-2
https://ubuntu.com/security/notices/USN-4163-1
https://ubuntu.com/security/notices/USN-4163-2
https://usn.ubuntu.com/4157-1/
https://usn.ubuntu.com/4157-2/
https://usn.ubuntu.com/4162-1/
https://usn.ubuntu.com/4162-2/
https://usn.ubuntu.com/4163-1/
https://usn.ubuntu.com/4163-2/
https://www.openwall.com/lists/oss-security/2019/08/28/1
| +| kernel-headers | CVE-2019-14815 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.17.1.el7a |
Expand...https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/errata/RHSA-2020:0328
https://access.redhat.com/errata/RHSA-2020:0339
https://access.redhat.com/security/cve/CVE-2019-14815
https://access.redhat.com/security/cve/cve-2019-14815
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14815
https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a
https://linux.oracle.com/cve/CVE-2019-14815.html
https://linux.oracle.com/errata/ELSA-2020-5676.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lore.kernel.org/linux-wireless/20190828020751.13625-1-huangwenabc@gmail.com
https://lore.kernel.org/linux-wireless/20190828020751.13625-1-huangwenabc@gmail.com/
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4157-1
https://ubuntu.com/security/notices/USN-4157-2
https://ubuntu.com/security/notices/USN-4162-1
https://ubuntu.com/security/notices/USN-4162-2
https://www.openwall.com/lists/oss-security/2019/08/28/1
| +| kernel-headers | CVE-2019-14898 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1062.12.1.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-14898
https://bugs.chromium.org/p/project-zero/issues/detail?id=1790
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14898
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.114
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.37
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10
https://linux.oracle.com/cve/CVE-2019-14898.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://security.netapp.com/advisory/ntap-20200608-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-15030 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.18.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/09/10/3
https://access.redhat.com/errata/RHSA-2020:0740
https://access.redhat.com/security/cve/CVE-2019-15030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15030
https://git.kernel.org/linus/8205d5d98ef7f155de211f5e2eb6ca03d95a5a60
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60
https://linux.oracle.com/cve/CVE-2019-15030.html
https://linux.oracle.com/errata/ELSA-2020-1372.html
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4135-1
https://ubuntu.com/security/notices/USN-4135-2
https://usn.ubuntu.com/4135-1/
https://usn.ubuntu.com/4135-2/
| +| kernel-headers | CVE-2019-15031 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.19.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/09/10/4
https://access.redhat.com/security/cve/CVE-2019-15031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15031
https://git.kernel.org/linus/a8318c13e79badb92bc6640704a64cc022a6eb97
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a8318c13e79badb92bc6640704a64cc022a6eb97
https://linux.oracle.com/cve/CVE-2019-15031.html
https://linux.oracle.com/errata/ELSA-2020-1372.html
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4135-1
https://ubuntu.com/security/notices/USN-4135-2
https://usn.ubuntu.com/4135-1/
https://usn.ubuntu.com/4135-2/
| +| kernel-headers | CVE-2019-15213 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://access.redhat.com/security/cve/CVE-2019-15213
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| +| kernel-headers | CVE-2019-15214 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://access.redhat.com/security/cve/CVE-2019-15214
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15214
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c2f870890fd28e023b0fcf49dcee333f2c8bad7
https://linux.oracle.com/cve/CVE-2019-15214.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=75903e0021cef79bc434d068b5169b599b2a46a9
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
| +| kernel-headers | CVE-2019-15505 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-15505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505
https://git.linuxtv.org/media_tree.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b
https://linux.oracle.com/cve/CVE-2019-15505.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
https://lore.kernel.org/linux-media/20190821104408.w7krumcglxo6fz5q@gofer.mess.org/
https://lore.kernel.org/lkml/b9b256cb-95f2-5fa1-9956-5a602a017c11@gmail.com/
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20190905-0002/
https://support.f5.com/csp/article/K28222050
https://support.f5.com/csp/article/K28222050?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4157-1
https://ubuntu.com/security/notices/USN-4157-2
https://ubuntu.com/security/notices/USN-4162-1
https://ubuntu.com/security/notices/USN-4162-2
https://ubuntu.com/security/notices/USN-4163-1
https://ubuntu.com/security/notices/USN-4163-2
https://usn.ubuntu.com/4157-1/
https://usn.ubuntu.com/4157-2/
https://usn.ubuntu.com/4162-1/
https://usn.ubuntu.com/4162-2/
https://usn.ubuntu.com/4163-1/
https://usn.ubuntu.com/4163-2/
| +| kernel-headers | CVE-2019-15538 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.21.2.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2019-15538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15538
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1fb254aa983bf190cfd685d40c64a480a9bafaee
https://git.kernel.org/linus/1fb254aa983bf190cfd685d40c64a480a9bafaee
https://github.com/torvalds/linux/commit/1fb254aa983bf190cfd685d40c64a480a9bafaee
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
https://lore.kernel.org/linux-xfs/20190823035528.GH1037422@magnolia/
https://lore.kernel.org/linux-xfs/20190823192433.GA8736@eldamar.local
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K32592426?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4144-1
https://ubuntu.com/security/notices/USN-4147-1
https://usn.ubuntu.com/4144-1/
https://usn.ubuntu.com/4147-1/
| +| kernel-headers | CVE-2019-15666 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.19.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2019-15666
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.19
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15666
https://git.kernel.org/linus/b805d78d300bcf2c83d6df7da0c818b0fee41427
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b805d78d300bcf2c83d6df7da0c818b0fee41427
https://linux.oracle.com/cve/CVE-2019-15666.html
https://linux.oracle.com/errata/ELSA-2019-4820.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K53420251?utm_source=f5support&utm_medium=RSS
| +| kernel-headers | CVE-2019-15916 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.18.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/errata/RHSA-2020:0740
https://access.redhat.com/security/cve/CVE-2019-15916
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916
https://git.kernel.org/linus/895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab
https://linux.oracle.com/cve/CVE-2019-15916.html
https://linux.oracle.com/errata/ELSA-2020-5532.html
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K57418558?utm_source=f5support&utm_medium=RSS
| +| kernel-headers | CVE-2019-15917 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.26.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-15917
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15917
https://git.kernel.org/linus/56897b217a1d0a91c9920cb418d6b3fe922f590a
https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a
https://linux.oracle.com/cve/CVE-2019-15917.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| kernel-headers | CVE-2019-16746 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-16746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746
https://linux.oracle.com/cve/CVE-2019-16746.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TASE2ESEZAER6DTZH3DJ4K2JNO46TVL7/
https://marc.info/?l=linux-wireless&m=156901391225058&w=2
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20191031-0005/
https://ubuntu.com/security/notices/USN-4183-1
https://ubuntu.com/security/notices/USN-4186-1
https://ubuntu.com/security/notices/USN-4209-1
https://ubuntu.com/security/notices/USN-4210-1
https://usn.ubuntu.com/4183-1/
https://usn.ubuntu.com/4186-1/
https://usn.ubuntu.com/4209-1/
https://usn.ubuntu.com/4210-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-17053 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-17053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053
https://git.kernel.org/linus/e69dbd4619e7674c1679cba49afd9dd9ac347eef
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e69dbd4619e7674c1679cba49afd9dd9ac347eef
https://linux.oracle.com/cve/CVE-2019-17053.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/
https://seclists.org/bugtraq/2019/Nov/11
https://ubuntu.com/security/notices/USN-4184-1
https://ubuntu.com/security/notices/USN-4185-1
https://ubuntu.com/security/notices/USN-4185-2
https://ubuntu.com/security/notices/USN-4186-1
https://ubuntu.com/security/notices/USN-4186-2
https://usn.ubuntu.com/4184-1/
https://usn.ubuntu.com/4185-1/
https://usn.ubuntu.com/4185-2/
https://usn.ubuntu.com/4186-1/
https://usn.ubuntu.com/4186-2/
| +| kernel-headers | CVE-2019-17055 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/errata/RHSA-2020:0790
https://access.redhat.com/security/cve/CVE-2019-17055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055
https://git.kernel.org/linus/b91ee4aa2a2199ba4d4650706c272985a5a32d80
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80
https://linux.oracle.com/cve/CVE-2019-17055.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/
https://seclists.org/bugtraq/2019/Nov/11
https://ubuntu.com/security/notices/USN-4184-1
https://ubuntu.com/security/notices/USN-4185-1
https://ubuntu.com/security/notices/USN-4185-2
https://ubuntu.com/security/notices/USN-4186-1
https://ubuntu.com/security/notices/USN-4186-2
https://usn.ubuntu.com/4184-1/
https://usn.ubuntu.com/4185-1/
https://usn.ubuntu.com/4185-2/
https://usn.ubuntu.com/4186-1/
https://usn.ubuntu.com/4186-2/
| +| kernel-headers | CVE-2019-18660 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.17.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/11/27/1
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/security/cve/CVE-2019-18660
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18660
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad
https://linux.oracle.com/cve/CVE-2019-18660.html
https://linux.oracle.com/errata/ELSA-2020-2933.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4228-1
https://ubuntu.com/security/notices/USN-4228-2
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4228-1/
https://usn.ubuntu.com/4228-2/
https://www.openwall.com/lists/oss-security/2019/11/27/1
| +| kernel-headers | CVE-2019-18805 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.18.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
https://access.redhat.com/errata/RHSA-2020:0740
https://access.redhat.com/security/cve/CVE-2019-18805
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18805
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19fad20d15a6494f47f85d869f00b11343ee5c78
https://linux.oracle.com/cve/CVE-2019-18805.html
https://linux.oracle.com/errata/ELSA-2020-1769.html
https://security.netapp.com/advisory/ntap-20191205-0001/
| +| kernel-headers | CVE-2019-18808 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.26.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://www.openwall.com/lists/oss-security/2021/09/14/1
https://access.redhat.com/security/cve/CVE-2019-18808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808
https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2
https://linux.oracle.com/cve/CVE-2019-18808.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4525-1
https://ubuntu.com/security/notices/USN-4526-1
https://usn.ubuntu.com/4525-1/
https://usn.ubuntu.com/4526-1/
| +| kernel-headers | CVE-2019-19036 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19036
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19036
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4439-1/
| +| kernel-headers | CVE-2019-19046 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.29.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19046
https://bugzilla.suse.com/show_bug.cgi?id=1157304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046
https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab
https://linux.oracle.com/cve/CVE-2019-19046.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://ubuntu.com/security/notices/USN-4302-1
https://ubuntu.com/security/notices/USN-4319-1
https://ubuntu.com/security/notices/USN-4325-1
https://usn.ubuntu.com/4302-1/
https://usn.ubuntu.com/4319-1/
https://usn.ubuntu.com/4325-1/
| +| kernel-headers | CVE-2019-19055 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-19055
https://bugzilla.suse.com/show_bug.cgi?id=1157319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19055
https://github.com/torvalds/linux/commit/1399c59fa92984836db90538cf92397fe7caaa57
https://linux.oracle.com/cve/CVE-2019-19055.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
| +| kernel-headers | CVE-2019-19077 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19077
https://github.com/torvalds/linux/commit/4a9d46a9fe14401f21df69cea97c62396d5fb053
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
| +| kernel-headers | CVE-2019-19332 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-19332
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332
https://git.kernel.org/linus/433f4ba1904100da65a311033f17a9bf586b287e
https://linux.oracle.com/cve/CVE-2019-19332.html
https://linux.oracle.com/errata/ELSA-2020-5535.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/
https://security.netapp.com/advisory/ntap-20200204-0002/
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.openwall.com/lists/oss-security/2019/12/16/1
| +| kernel-headers | CVE-2019-19338 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1062.18.1.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-19338
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19338
https://linux.oracle.com/cve/CVE-2019-19338.html
https://linux.oracle.com/errata/ELSA-2020-0834.html
https://nvd.nist.gov/vuln/detail/CVE-2019-19338
https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort
https://www.openwall.com/lists/oss-security/2019/12/10/3
| +| kernel-headers | CVE-2019-19377 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19377
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19377
https://linux.oracle.com/cve/CVE-2019-19377.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4367-1
https://ubuntu.com/security/notices/USN-4369-1
https://ubuntu.com/security/notices/USN-4414-1
https://usn.ubuntu.com/4367-1/
https://usn.ubuntu.com/4369-1/
https://usn.ubuntu.com/4414-1/
| +| kernel-headers | CVE-2019-19447 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.21.2.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19447
https://bugzilla.kernel.org/show_bug.cgi?id=205433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447
https://linux.oracle.com/cve/CVE-2019-19447.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lore.kernel.org/r/20191112032903.8828-1-tytso@mit.edu
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| kernel-headers | CVE-2019-19523 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19523
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19523
https://git.kernel.org/linus/44efc269db7929f6275a1fa927ef082e533ecde0
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=44efc269db7929f6275a1fa927ef082e533ecde0
https://linux.oracle.com/cve/CVE-2019-19523.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
| +| kernel-headers | CVE-2019-19524 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.21.2.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19524
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524
https://git.kernel.org/linus/fa3a5a1880c91bb92594ad42dfe9eedad7996b86
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa3a5a1880c91bb92594ad42dfe9eedad7996b86
https://linux.oracle.com/cve/CVE-2019-19524.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://seclists.org/bugtraq/2020/Jan/10
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4228-1
https://ubuntu.com/security/notices/USN-4228-2
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4228-1/
https://usn.ubuntu.com/4228-2/
| +| kernel-headers | CVE-2019-19527 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.18.2.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19527
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19527
https://git.kernel.org/linus/6d4472d7bec39917b54e4e80245784ea5d60ce49
https://git.kernel.org/linus/9c09b214f30e3c11f9b0b03f89442df03643794d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9c09b214f30e3c11f9b0b03f89442df03643794d
https://linux.oracle.com/cve/CVE-2019-19527.html
https://linux.oracle.com/errata/ELSA-2020-5709.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
| +| kernel-headers | CVE-2019-19528 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19528
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19528
https://git.kernel.org/linus/edc4746f253d907d048de680a621e121517f484b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c468a8aa790e0dfe0a7f8a39db282d39c2c00b46
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=edc4746f253d907d048de680a621e121517f484b
https://linux.oracle.com/cve/CVE-2019-19528.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
| +| kernel-headers | CVE-2019-19530 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://seclists.org/oss-sec/2019/q4/115
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19530
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19530
https://git.kernel.org/linus/c52873e5a1ef72f845526d9f6a50704433f9c625
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625
https://linux.oracle.com/cve/CVE-2019-19530.html
https://linux.oracle.com/errata/ELSA-2020-5956.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
| +| kernel-headers | CVE-2019-19534 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19534
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19534
https://git.kernel.org/linus/f7a1337f0d29b98733c8824e165fca3371d7d4fd
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7a1337f0d29b98733c8824e165fca3371d7d4fd
https://linux.oracle.com/cve/CVE-2019-19534.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4228-1
https://ubuntu.com/security/notices/USN-4228-2
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4228-1/
https://usn.ubuntu.com/4228-2/
| +| kernel-headers | CVE-2019-19536 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19536
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19536
https://git.kernel.org/linus/ead16e53c2f0ed946d82d4037c630e2f60f4ab69
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ead16e53c2f0ed946d82d4037c630e2f60f4ab69
https://linux.oracle.com/cve/CVE-2019-19536.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://www.nxp.com/docs/en/reference-manual/BCANPSV2.pdf
| +| kernel-headers | CVE-2019-19537 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19537
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537
https://git.kernel.org/linus/303911cfc5b95d33687d9046133ff184cf5043ff
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=303911cfc5b95d33687d9046133ff184cf5043ff
https://linux.oracle.com/cve/CVE-2019-19537.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
| +| kernel-headers | CVE-2019-19767 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.26.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19767
https://bugzilla.kernel.org/show_bug.cgi?id=205609
https://bugzilla.kernel.org/show_bug.cgi?id=205707
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a
https://git.kernel.org/linus/4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a
https://github.com/torvalds/linux/commit/4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a
https://linux.oracle.com/cve/CVE-2019-19767.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| kernel-headers | CVE-2019-19770 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
https://access.redhat.com/security/cve/CVE-2019-19770
https://bugzilla.kernel.org/show_bug.cgi?id=205713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19770
https://github.com/mcgrof/break-blktrace
https://linux.oracle.com/cve/CVE-2019-19770.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://lore.kernel.org/linux-block/20200402000002.7442-1-mcgrof@kernel.org/
https://lore.kernel.org/linux-block/20200419194529.4872-1-mcgrof@kernel.org/
https://lore.kernel.org/linux-block/20200516031956.2605-1-mcgrof@kernel.org/
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4680-1
| +| kernel-headers | CVE-2019-19816 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19816
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19816
https://linux.oracle.com/cve/CVE-2019-19816.html
https://linux.oracle.com/errata/ELSA-2020-5995.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4708-1
https://ubuntu.com/security/notices/USN-4709-1
https://usn.ubuntu.com/4414-1/
| +| kernel-headers | CVE-2019-19927 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19927
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19927
https://github.com/torvalds/linux/commit/453393369dc9806d2455151e329c599684762428
https://github.com/torvalds/linux/commit/a66477b0efe511d98dde3e4aaeb189790e6f0a39
https://github.com/torvalds/linux/commit/ac1e516d5a4c56bf0cb4a3dfc0672f689131cfd4
https://security.netapp.com/advisory/ntap-20200204-0002/
| +| kernel-headers | CVE-2019-2054 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
https://access.redhat.com/security/cve/CVE-2019-2054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2054
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f3912fd934cdfd03d93f2dc6f064099795bf638
https://github.com/GrapheneOS/kernel_google_marlin/commit/bac2f2dde8af50c477b580743deb688db25e9e63
https://source.android.com/security/bulletin/2019-05-01
https://ubuntu.com/security/notices/USN-4076-1
https://ubuntu.com/security/notices/USN-4095-2
https://usn.ubuntu.com/4076-1/
https://usn.ubuntu.com/4095-2/
| +| kernel-headers | CVE-2019-20636 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.26.1.el7a |
Expand...https://access.redhat.com/security/cve/CVE-2019-20636
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20636
https://git.kernel.org/linus/cb222aed03d798fc074be55e59d9a112338ee784
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb222aed03d798fc074be55e59d9a112338ee784
https://github.com/torvalds/linux/commit/cb222aed03d798fc074be55e59d9a112338ee784
https://linux.oracle.com/cve/CVE-2019-20636.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://security.netapp.com/advisory/ntap-20200430-0004/
| +| kernel-headers | CVE-2019-20794 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1
https://access.redhat.com/security/cve/CVE-2019-20794
https://github.com/sargun/fuse-example
https://nvd.nist.gov/vuln/detail/CVE-2019-20794
https://security.netapp.com/advisory/ntap-20200608-0001/
https://sourceforge.net/p/fuse/mailman/message/36598753/
| +| kernel-headers | CVE-2019-20812 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
https://access.redhat.com/security/cve/CVE-2019-20812
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20812
https://git.kernel.org/linus/b43d1f9f7067c6759b1051e8ecb84e82cef569fe
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b43d1f9f7067c6759b1051e8ecb84e82cef569fe
https://linux.oracle.com/cve/CVE-2019-20812.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-3459 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.18.1.el7a |
Expand...http://www.openwall.com/lists/oss-security/2019/06/27/2
http://www.openwall.com/lists/oss-security/2019/06/27/7
http://www.openwall.com/lists/oss-security/2019/06/28/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/08/12/1
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/errata/RHSA-2020:0740
https://access.redhat.com/security/cve/CVE-2019-3459
https://bugzilla.novell.com/show_bug.cgi?id=1120758
https://bugzilla.redhat.com/show_bug.cgi?id=1663176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459
https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69
https://linux.oracle.com/cve/CVE-2019-3459.html
https://linux.oracle.com/errata/ELSA-2019-4670.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047@kroah.com/
https://lore.kernel.org/linux-bluetooth/20190118124319.12187-1-marcel@holtmann.org/
https://marc.info/?l=oss-security&m=154721580222522&w=2
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html
https://ubuntu.com/security/notices/USN-3930-1
https://ubuntu.com/security/notices/USN-3930-2
https://ubuntu.com/security/notices/USN-3931-1
https://ubuntu.com/security/notices/USN-3931-2
https://ubuntu.com/security/notices/USN-3932-1
https://ubuntu.com/security/notices/USN-3932-2
https://ubuntu.com/security/notices/USN-3933-1
https://ubuntu.com/security/notices/USN-3933-2
| +| kernel-headers | CVE-2019-3460 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.18.1.el7a |
Expand...http://www.openwall.com/lists/oss-security/2019/06/27/2
http://www.openwall.com/lists/oss-security/2019/06/27/7
http://www.openwall.com/lists/oss-security/2019/06/28/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/08/12/1
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/errata/RHSA-2020:0740
https://access.redhat.com/security/cve/CVE-2019-3460
https://bugzilla.redhat.com/show_bug.cgi?id=1663179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460
https://git.kernel.org/linus/af3d5d1c87664a4f150fcf3534c6567cb19909b0
https://linux.oracle.com/cve/CVE-2019-3460.html
https://linux.oracle.com/errata/ELSA-2019-3517.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
https://lore.kernel.org/linux-bluetooth/20190110062917.GB15047@kroah.com/
https://lore.kernel.org/linux-bluetooth/20190118115620.7562-1-marcel@holtmann.org/
https://marc.info/?l=oss-security&m=154721580222522&w=2
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html
https://seclists.org/oss-sec/2019/q1/58
https://ubuntu.com/security/notices/USN-3930-1
https://ubuntu.com/security/notices/USN-3930-2
https://ubuntu.com/security/notices/USN-3931-1
https://ubuntu.com/security/notices/USN-3931-2
https://ubuntu.com/security/notices/USN-3932-1
https://ubuntu.com/security/notices/USN-3932-2
https://ubuntu.com/security/notices/USN-3933-1
https://ubuntu.com/security/notices/USN-3933-2
| +| kernel-headers | CVE-2019-3874 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/CVE-2019-3874
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3874
https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=1033990ac5b2ab6cee93734cb6d301aa3a35bcaa
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=9dde27de3e5efa0d032f3c891a0ca833a0d31911
https://linux.oracle.com/cve/CVE-2019-3874.html
https://linux.oracle.com/errata/ELSA-2020-5885.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u
https://lore.kernel.org/netdev/cover.1554022192.git.lucien.xin@gmail.com/
https://security.netapp.com/advisory/ntap-20190411-0003/
https://ubuntu.com/security/notices/USN-3979-1
https://ubuntu.com/security/notices/USN-3980-1
https://ubuntu.com/security/notices/USN-3980-2
https://ubuntu.com/security/notices/USN-3981-1
https://ubuntu.com/security/notices/USN-3981-2
https://ubuntu.com/security/notices/USN-3982-1
https://ubuntu.com/security/notices/USN-3982-2
https://usn.ubuntu.com/3979-1/
https://usn.ubuntu.com/3980-1/
https://usn.ubuntu.com/3980-2/
https://usn.ubuntu.com/3981-1/
https://usn.ubuntu.com/3981-2/
https://usn.ubuntu.com/3982-1/
https://usn.ubuntu.com/3982-2/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-3901 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://www.securityfocus.com/bid/89937
https://access.redhat.com/security/cve/CVE-2019-3901
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3901
https://linux.oracle.com/cve/CVE-2019-3901.html
https://linux.oracle.com/errata/ELSA-2021-9473.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
https://security.netapp.com/advisory/ntap-20190517-0005/
| +| kernel-headers | CVE-2019-5108 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.19.1.el7a |
Expand...http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html
https://access.redhat.com/security/cve/CVE-2019-5108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
https://git.kernel.org/linus/3e493173b7841259a08c5c8e5cbe90adb349da7e
https://linux.oracle.com/cve/CVE-2019-5108.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://security.netapp.com/advisory/ntap-20200204-0002/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0900
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.debian.org/security/2020/dsa-4698
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-9454 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.21.2.el7a |
Expand...https://access.redhat.com/security/cve/CVE-2019-9454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454
https://git.kernel.org/linus/89c6efa61f5709327ecfa24bff18e57a4e80c7fa
https://linux.oracle.com/cve/CVE-2019-9454.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://source.android.com/security/bulletin/pixel/2019-09-01
| +| kernel-headers | CVE-2019-9458 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.26.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
https://access.redhat.com/security/cve/CVE-2019-9458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9458
https://git.kernel.org/linus/ad608fbcf166fec809e402d548761768f602702c
https://linux.oracle.com/cve/CVE-2019-9458.html
https://linux.oracle.com/errata/ELSA-2021-9442.html
https://source.android.com/security/bulletin/pixel/2019-09-01
| +| kernel-headers | CVE-2019-9503 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-9503
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html#cve-2019-9503-remotely-sending-firmware-events-bypassing-is-wlc-event-frame
https://bugzilla.redhat.com/show_bug.cgi?id=1701842
https://bugzilla.suse.com/show_bug.cgi?id=1132828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4176ec356c73a46c07c181c6d04039fafa34a9f
https://kb.cert.org/vuls/id/166939/
https://linux.oracle.com/cve/CVE-2019-9503.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9503.html
https://security-tracker.debian.org/tracker/CVE-2019-9503
https://ubuntu.com/security/notices/USN-3979-1
https://ubuntu.com/security/notices/USN-3980-1
https://ubuntu.com/security/notices/USN-3980-2
https://ubuntu.com/security/notices/USN-3981-1
https://ubuntu.com/security/notices/USN-3981-2
https://ubuntu.com/security/notices/USN-4076-1
https://ubuntu.com/security/notices/USN-4095-1
https://www.bleepingcomputer.com/news/security/broadcom-wifi-driver-flaws-expose-computers-phones-iot-to-rce-attacks/
| +| kernel-headers | CVE-2020-0305 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
https://access.redhat.com/security/cve/CVE-2020-0305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0305
https://git.kernel.org/linus/68faa679b8be1a74e6663c21c3a9d25d32f1c079
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079
https://linux.oracle.com/cve/CVE-2020-0305.html
https://linux.oracle.com/errata/ELSA-2021-9442.html
https://source.android.com/security/bulletin/pixel/2020-06-01
| +| kernel-headers | CVE-2020-0404 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
https://access.redhat.com/security/cve/CVE-2020-0404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0404
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/68035c80e129c4cfec659aac4180354530b26527
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527
https://linux.oracle.com/cve/CVE-2020-0404.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://source.android.com/security/bulletin/2020-09-01
| +| kernel-headers | CVE-2020-0431 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
https://access.redhat.com/security/cve/CVE-2020-0431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0431
https://git.kernel.org/linus/4f3882177240a1f55e45a3d241d3121341bead78
https://linux.oracle.com/cve/CVE-2020-0431.html
https://linux.oracle.com/errata/ELSA-2021-9086.html
https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/
https://source.android.com/security/bulletin/pixel/2020-09-01
| +| kernel-headers | CVE-2020-0465 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-0465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0465
https://git.kernel.org/linus/35556bed836f8dc07ac55f69c8d17dce3e7f0e25
https://git.kernel.org/linus/bce1305c0ece3dc549663605e567655dd701752c
https://linux.oracle.com/cve/CVE-2020-0465.html
https://linux.oracle.com/errata/ELSA-2022-0620.html
https://source.android.com/security/bulletin/2020-12-01
https://ubuntu.com/security/notices/USN-4912-1
| +| kernel-headers | CVE-2020-10135 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html
http://seclists.org/fulldisclosure/2020/Jun/5
https://access.redhat.com/security/cve/CVE-2020-10135
https://bugzilla.suse.com/show_bug.cgi?id=1171988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10135
https://francozappa.github.io/about-bias/
https://github.com/marcinguy/CVE-2020-10135-BIAS
https://kb.cert.org/vuls/id/647177/
https://lkml.org/lkml/2020/10/15/98
https://lore.kernel.org/linux-bluetooth/20200520212015.626026-2-luiz.dentz@gmail.com/T/#m3d2012da00716dc280e9725484e8ff1d640d03b5
https://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4659-1
https://ubuntu.com/security/notices/USN-4680-1
https://ubuntu.com/security/notices/USN-4752-1
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/bias-vulnerability/
| +| kernel-headers | CVE-2020-10720 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.26.1.el7a |
Expand...https://access.redhat.com/security/cve/CVE-2020-10720
https://bugzilla.redhat.com/show_bug.cgi?id=1781204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10720
https://git.kernel.org/linus/a4270d6795b0580287453ea55974d948393e66ef
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef
https://linux.oracle.com/cve/CVE-2020-10720.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://syzkaller.appspot.com/bug?id=7b571739e71a77303e665c793d1f773ce3823226
| +| kernel-headers | CVE-2020-10732 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
https://access.redhat.com/security/cve/CVE-2020-10732
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=aca969cacf07f41070d788ce2b8ca71f09d5207d
https://github.com/google/kmsan/issues/76
https://github.com/ruscur/linux/commit/a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a
https://linux.oracle.com/cve/CVE-2020-10732.html
https://linux.oracle.com/errata/ELSA-2020-5837.html
https://lore.kernel.org/lkml/CAG48ez1u9=Uqcx2dH=7xea1R+WpnL239DSoVHLwV09=FxZUevQ@mail.gmail.com/#t
https://lore.kernel.org/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20210129-0005/
https://twitter.com/grsecurity/status/1252558055629299712
https://ubuntu.com/security/notices/USN-4411-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://ubuntu.com/security/notices/USN-4485-1
https://usn.ubuntu.com/4411-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
https://usn.ubuntu.com/4485-1/
https://www.openwall.com/lists/oss-security/2020/05/06/1
| +| kernel-headers | CVE-2020-10742 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-10742
https://bugzilla.redhat.com/show_bug.cgi?id=1835127
https://linux.oracle.com/cve/CVE-2020-10742.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
| +| kernel-headers | CVE-2020-10751 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
http://www.openwall.com/lists/oss-security/2020/05/27/3
https://access.redhat.com/security/cve/CVE-2020-10751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
https://git.kernel.org/linus/fb73974172ffaaf57a7c42f35424d9aece1a5af6
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6
https://linux.oracle.com/cve/CVE-2020-10751.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/
https://ubuntu.com/security/notices/USN-4389-1
https://ubuntu.com/security/notices/USN-4390-1
https://ubuntu.com/security/notices/USN-4391-1
https://ubuntu.com/security/notices/USN-4412-1
https://ubuntu.com/security/notices/USN-4413-1
https://usn.ubuntu.com/4389-1/
https://usn.ubuntu.com/4390-1/
https://usn.ubuntu.com/4391-1/
https://usn.ubuntu.com/4412-1/
https://usn.ubuntu.com/4413-1/
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
https://www.openwall.com/lists/oss-security/2020/04/30/5
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2020-10769 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.29.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
https://access.redhat.com/security/cve/CVE-2020-10769
https://bugzilla.redhat.com/show_bug.cgi?id=1708775;
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10769
https://git.kernel.org/linus/8f9c469348487844328e162db57112f7d347c49f
https://linux.oracle.com/cve/CVE-2020-10769.html
https://linux.oracle.com/errata/ELSA-2020-5983.html
https://lkml.org/lkml/2019/1/21/675
https://www.openwall.com/lists/oss-security/2020/06/23/1
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2020-11565 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.26.1.el7a |
Expand...https://access.redhat.com/security/cve/CVE-2020-11565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
https://git.kernel.org/linus/aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
https://github.com/torvalds/linux/commit/aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
https://linux.oracle.com/cve/CVE-2020-11565.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-11565
https://ubuntu.com/security/notices/USN-4363-1
https://ubuntu.com/security/notices/USN-4364-1
https://ubuntu.com/security/notices/USN-4367-1
https://ubuntu.com/security/notices/USN-4368-1
https://ubuntu.com/security/notices/USN-4369-1
https://usn.ubuntu.com/4363-1/
https://usn.ubuntu.com/4364-1/
https://usn.ubuntu.com/4367-1/
https://usn.ubuntu.com/4368-1/
https://usn.ubuntu.com/4369-1/
https://www.debian.org/security/2020/dsa-4667
https://www.debian.org/security/2020/dsa-4698
| +| kernel-headers | CVE-2020-11669 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.36.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/CVE-2020-11669
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11669
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=53a712bae5dd919521a58d7bad773b949358add0
https://git.kernel.org/linus/53a712bae5dd919521a58d7bad773b949358add0
https://github.com/torvalds/linux/commit/53a712bae5dd919521a58d7bad773b949358add0
https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208660.html
https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208661.html
https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208663.html
https://security.netapp.com/advisory/ntap-20200430-0001/
https://ubuntu.com/security/notices/USN-4363-1
https://ubuntu.com/security/notices/USN-4368-1
https://usn.ubuntu.com/4363-1/
https://usn.ubuntu.com/4368-1/
https://www.openwall.com/lists/oss-security/2020/04/15/1
| +| kernel-headers | CVE-2020-12114 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html
http://www.openwall.com/lists/oss-security/2020/05/04/2
https://access.redhat.com/security/cve/CVE-2020-12114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4edbe133f851c9e3a2f2a1db367e826b01e72594
https://linux.oracle.com/cve/CVE-2020-12114.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4387-1
https://ubuntu.com/security/notices/USN-4388-1
https://ubuntu.com/security/notices/USN-4389-1
https://ubuntu.com/security/notices/USN-4390-1
https://ubuntu.com/security/notices/USN-4391-1
https://ubuntu.com/security/notices/USN-4392-1
https://usn.ubuntu.com/4387-1/
https://usn.ubuntu.com/4388-1/
https://usn.ubuntu.com/4389-1/
https://usn.ubuntu.com/4390-1/
https://usn.ubuntu.com/4391-1/
https://usn.ubuntu.com/4392-1/
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
https://www.openwall.com/lists/oss-security/2020/05/04/2
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2020-12363 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.31.1.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| kernel-headers | CVE-2020-12364 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.31.1.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| kernel-headers | CVE-2020-12464 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-12464
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=056ad39ee9253873522f6469c3364964a322912b
https://git.kernel.org/linus/056ad39ee9253873522f6469c3364964a322912b (5.7-rc3)
https://github.com/torvalds/linux/commit/056ad39ee9253873522f6469c3364964a322912b
https://linux.oracle.com/cve/CVE-2020-12464.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lkml.org/lkml/2020/3/23/52
https://nvd.nist.gov/vuln/detail/CVE-2020-12464
https://patchwork.kernel.org/patch/11463781/
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4387-1
https://ubuntu.com/security/notices/USN-4388-1
https://ubuntu.com/security/notices/USN-4389-1
https://ubuntu.com/security/notices/USN-4390-1
https://ubuntu.com/security/notices/USN-4391-1
https://usn.ubuntu.com/4387-1/
https://usn.ubuntu.com/4388-1/
https://usn.ubuntu.com/4389-1/
https://usn.ubuntu.com/4390-1/
https://usn.ubuntu.com/4391-1/
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
| +| kernel-headers | CVE-2020-12770 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
https://git.kernel.org/linus/83c6f2390040f188cc25b270b4befeb5628c1aee (5.7-rc3)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=83c6f2390040f188cc25b270b4befeb5628c1aee
https://linux.oracle.com/cve/CVE-2020-12770.html
https://linux.oracle.com/errata/ELSA-2020-5756.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES5C6ZCMALBEBMKNNCTBSLLSYGFZG3FF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IO5XIQSRI747P4RVVTNX7TUPEOCF4OPU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R54VC7B6MDYKP57AWC2HN7AUJYH62RKI/
https://lkml.org/lkml/2020/4/13/870
https://nvd.nist.gov/vuln/detail/CVE-2020-12770
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4411-1
https://ubuntu.com/security/notices/USN-4412-1
https://ubuntu.com/security/notices/USN-4413-1
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4419-1
https://usn.ubuntu.com/4411-1/
https://usn.ubuntu.com/4412-1/
https://usn.ubuntu.com/4413-1/
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4419-1/
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
| +| kernel-headers | CVE-2020-12826 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12826
https://bugzilla.redhat.com/show_bug.cgi?id=1822077
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826
https://git.kernel.org/linus/d1e7fd6462ca9fc76650fbe6ca800e35b24267da
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da
https://github.com/torvalds/linux/commit/7395ea4e65c2a00d23185a3f63ad315756ba9cef
https://linux.oracle.com/cve/CVE-2020-12826.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lists.openwall.net/linux-kernel/2020/03/24/1803
https://nvd.nist.gov/vuln/detail/CVE-2020-12826
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4367-1
https://ubuntu.com/security/notices/USN-4369-1
https://ubuntu.com/security/notices/USN-4391-1
https://usn.ubuntu.com/4367-1/
https://usn.ubuntu.com/4369-1/
https://usn.ubuntu.com/4391-1/
https://www.openwall.com/lists/kernel-hardening/2020/03/25/1
| +| kernel-headers | CVE-2020-13974 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
https://access.redhat.com/security/cve/CVE-2020-13974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13974
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/b86dab054059b970111b5516ae548efaae5b3aae
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=dad0bf9ce93fa40b667eccd3306783f4db4b932b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae
https://linux.oracle.com/cve/CVE-2020-13974.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html
https://lkml.org/lkml/2020/3/22/482
https://lore.kernel.org/lkml/CAEAjams79+V8bxpcp3UAsU1AnJ+gx2y+ZqhDhjJCpZn2oeZA4Q@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2020-13974
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://ubuntu.com/security/notices/USN-4483-1
https://ubuntu.com/security/notices/USN-4485-1
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
https://usn.ubuntu.com/4483-1/
https://usn.ubuntu.com/4485-1/
| +| kernel-headers | CVE-2020-14305 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-14305
https://bugs.openvz.org/browse/OVZ-7188
https://bugzilla.redhat.com/show_bug.cgi?id=1850716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14305
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v4.9.232&id=396ba2fc4f27ef6c44bbc0098bfddf4da76dc4c9
https://linux.oracle.com/cve/CVE-2020-14305.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://patchwork.ozlabs.org/project/netfilter-devel/patch/c2385b5c-309c-cc64-2e10-a0ef62897502@virtuozzo.com/
https://security.netapp.com/advisory/ntap-20201210-0004/
| +| kernel-headers | CVE-2020-14381 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-14381
https://bugzilla.redhat.com/show_bug.cgi?id=1874311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14381
https://git.kernel.org/linus/8019ad13ef7f64be44d4f892af9c840179009254
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254
https://linux.oracle.com/cve/CVE-2020-14381.html
https://linux.oracle.com/errata/ELSA-2021-9007.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14381
| +| kernel-headers | CVE-2020-14416 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
https://access.redhat.com/security/cve/CVE-2020-14416
https://bugzilla.suse.com/show_bug.cgi?id=1162002
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.16
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14416
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ace17d56824165c7f4c68785d6b58971db954dd
https://linux.oracle.com/cve/CVE-2020-14416.html
https://linux.oracle.com/errata/ELSA-2020-5801.html
| +| kernel-headers | CVE-2020-15436 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.35.1.el7a |
Expand...https://access.redhat.com/security/cve/CVE-2020-15436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15436
https://git.kernel.org/linus/2d3a8e2deddea6c89961c422ec0c5b851e648c14
https://linux.oracle.com/cve/CVE-2020-15436.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://lkml.org/lkml/2020/6/7/379
https://nvd.nist.gov/vuln/detail/CVE-2020-15436
https://security.netapp.com/advisory/ntap-20201218-0002/
https://ubuntu.com/security/notices/USN-4752-1
| +| kernel-headers | CVE-2020-16166 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
https://access.redhat.com/security/cve/CVE-2020-16166
https://arxiv.org/pdf/2012.07432.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f227e3ec3b5cad859ad15666874405e8c1bbc1d4
https://git.kernel.org/linus/f227e3ec3b5cad859ad15666874405e8c1bbc1d4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c51f8f88d705e06bd696d7510aff22b33eb8e638
https://github.com/torvalds/linux/commit/f227e3ec3b5cad859ad15666874405e8c1bbc1d4
https://linux.oracle.com/cve/CVE-2020-16166.html
https://linux.oracle.com/errata/ELSA-2020-5962.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAPTLPAEKVAJYJ4LHN7VH4CN2W75R2YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFBCLQWJI5I4G25TVJNLXLAXJ4MERQNW/
https://nvd.nist.gov/vuln/detail/CVE-2020-16166
https://security.netapp.com/advisory/ntap-20200814-0004/
https://ubuntu.com/security/notices/USN-4525-1
https://ubuntu.com/security/notices/USN-4526-1
https://usn.ubuntu.com/4525-1/
https://usn.ubuntu.com/4526-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2020-1749 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.35.1.el7a |
Expand...https://access.redhat.com/security/cve/CVE-2020-1749
https://bugzilla.redhat.com/show_bug.cgi?id=1809833
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=6c8991f41546
https://linux.oracle.com/cve/CVE-2020-1749.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://security.netapp.com/advisory/ntap-20201222-0001/
https://ubuntu.com/security/notices/USN-4388-1
https://ubuntu.com/security/notices/USN-4390-1
https://ubuntu.com/security/notices/USN-4391-1
| +| kernel-headers | CVE-2020-24502 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-24502
https://linux.oracle.com/cve/CVE-2020-24502.html
https://linux.oracle.com/cve/CVE-2020-245024.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
| +| kernel-headers | CVE-2020-24503 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-24503
https://linux.oracle.com/cve/CVE-2020-24503.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
| +| kernel-headers | CVE-2020-24504 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-24504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504
https://linux.oracle.com/cve/CVE-2020-24504.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
| +| kernel-headers | CVE-2020-24586 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-24586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-24586.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
| +| kernel-headers | CVE-2020-24587 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-24587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-24587.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
| +| kernel-headers | CVE-2020-24588 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-24588
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-24588.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
| +| kernel-headers | CVE-2020-25284 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
https://access.redhat.com/security/cve/CVE-2020-25284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284
https://git.kernel.org/linus/f44d04e696feaf13d192d942c4f14ad2e117065a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f44d04e696feaf13d192d942c4f14ad2e117065a
https://linux.oracle.com/cve/CVE-2020-25284.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-25284
https://twitter.com/grsecurity/status/1304537507560919041
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4752-1
| +| kernel-headers | CVE-2020-25285 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-25285
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25285
https://git.kernel.org/linus/17743798d81238ab13050e8e2833699b54e15467
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17743798d81238ab13050e8e2833699b54e15467
https://linux.oracle.com/cve/CVE-2020-25285.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-25285
https://security.netapp.com/advisory/ntap-20201009-0002/
https://twitter.com/grsecurity/status/1303749848898904067
https://ubuntu.com/security/notices/USN-4576-1
https://ubuntu.com/security/notices/USN-4579-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4912-1
https://usn.ubuntu.com/4576-1/
https://usn.ubuntu.com/4579-1/
| +| kernel-headers | CVE-2020-26139 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26139
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26139.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
| +| kernel-headers | CVE-2020-26140 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26140
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26140.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
| +| kernel-headers | CVE-2020-26141 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26141
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26141.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
| +| kernel-headers | CVE-2020-26143 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26143
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26143.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
| +| kernel-headers | CVE-2020-26144 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26144
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26144.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
| +| kernel-headers | CVE-2020-26555 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-26555
https://bugzilla.redhat.com/show_bug.cgi?id=1918601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555
https://kb.cert.org/vuls/id/799380
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://ubuntu.com/security/notices/USN-5343-1
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
| +| kernel-headers | CVE-2020-27067 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27067
https://salsa.debian.org/kernel-team/kernel-sec/-/blob/master/retired/CVE-2020-27067
https://source.android.com/security/bulletin/pixel/2020-12-01
| +| kernel-headers | CVE-2020-27170 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.31.1.el7 |
Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
http://www.openwall.com/lists/oss-security/2021/03/24/4
https://access.redhat.com/security/cve/CVE-2020-27170
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27170
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f232326f6966cf2a1d1db7bc917a4ce5f9f55f76
https://linux.oracle.com/cve/CVE-2020-27170.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2020-27170
https://ubuntu.com/security/notices/USN-4887-1
https://ubuntu.com/security/notices/USN-4890-1
https://www.openwall.com/lists/oss-security/2021/03/19/2
| +| kernel-headers | CVE-2020-27171 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
http://www.openwall.com/lists/oss-security/2021/03/24/5
https://access.redhat.com/security/cve/CVE-2020-27171
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27171
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=10d2bb2e6b1d8c4576c56a748f697dbeb8388899
https://linux.oracle.com/cve/CVE-2020-27171.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2020-27171
https://ubuntu.com/security/notices/USN-4887-1
https://ubuntu.com/security/notices/USN-4890-1
https://www.openwall.com/lists/oss-security/2021/03/19/3
| +| kernel-headers | CVE-2020-2732 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2020-2732
https://bugzilla.redhat.com/show_bug.cgi?id=1805135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
https://git.kernel.org/linus/07721feee46b4b248402133228235318199b05ec
https://git.kernel.org/linus/35a571346a94fb93b5b3b6a599675ef3384bc75c
https://git.kernel.org/linus/e71237d3ff1abf9f3388337cfebf53b96df2020d
https://linux.oracle.com/cve/CVE-2020-2732.html
https://linux.oracle.com/errata/ELSA-2020-5540.html
https://linux.oracle.com/errata/ELSA-2020-5542.html
https://linux.oracle.com/errata/ELSA-2020-5543.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://ubuntu.com/security/notices/USN-4300-1
https://ubuntu.com/security/notices/USN-4301-1
https://ubuntu.com/security/notices/USN-4302-1
https://ubuntu.com/security/notices/USN-4303-1
https://ubuntu.com/security/notices/USN-4303-2
https://www.debian.org/security/2020/dsa-4667
https://www.debian.org/security/2020/dsa-4698
https://www.openwall.com/lists/oss-security/2020/02/25/3
https://www.openwall.com/lists/oss-security/2020/02/25/4
https://www.spinics.net/lists/kvm/msg208259.html
| +| kernel-headers | CVE-2020-27786 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/03/1
https://access.redhat.com/security/cve/CVE-2020-27786
https://bugzilla.redhat.com/show_bug.cgi?id=1900933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27786
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d
https://linux.oracle.com/cve/CVE-2020-27786.html
https://linux.oracle.com/errata/ELSA-2021-9030.html
https://security.netapp.com/advisory/ntap-20210122-0002/
https://www.openwall.com/lists/oss-security/2020/12/01/1
| +| kernel-headers | CVE-2020-27835 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27835
https://bugzilla.redhat.com/show_bug.cgi?id=1901709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835
https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79
https://linux.oracle.com/cve/CVE-2020-27835.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://ubuntu.com/security/notices/USN-4751-1
| +| kernel-headers | CVE-2020-28097 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28097
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28097
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=973c096f6a85e5b5f2a295126ba6928d9a6afd45
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=973c096f6a85e5b5f2a295126ba6928d9a6afd45
https://github.com/torvalds/linux/commit/973c096f6a85e5b5f2a295126ba6928d9a6afd45
https://linux.oracle.com/cve/CVE-2020-28097.html
https://linux.oracle.com/errata/ELSA-2021-9442.html
https://seclists.org/oss-sec/2020/q3/176
https://security.netapp.com/advisory/ntap-20210805-0001/
https://www.openwall.com/lists/oss-security/2020/09/16/1
| +| kernel-headers | CVE-2020-28915 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28915
https://bugzilla.suse.com/show_bug.cgi?id=1178886
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28915
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5af08640795b2b9a940c9266c0260455377ae262
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6735b4632def0640dbdf4eb9f99816aca18c4f16
https://linux.oracle.com/cve/CVE-2020-28915.html
https://linux.oracle.com/errata/ELSA-2021-9043.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28915
https://syzkaller.appspot.com/bug?id=08b8be45afea11888776f897895aef9ad1c3ecfd
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4659-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4752-1
| +| kernel-headers | CVE-2020-28974 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2020/11/25/1
https://access.redhat.com/security/cve/CVE-2020-28974
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28974
https://git.kernel.org/linus/3c4e0dff2095c579b142d5a0693257f1c58b4804
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804
https://linux.oracle.com/cve/CVE-2020-28974.html
https://linux.oracle.com/errata/ELSA-2021-9043.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28974
https://seclists.org/oss-sec/2020/q4/104
https://security.netapp.com/advisory/ntap-20210108-0003/
https://ubuntu.com/security/notices/USN-4679-1
https://ubuntu.com/security/notices/USN-4680-1
https://ubuntu.com/security/notices/USN-4681-1
https://ubuntu.com/security/notices/USN-4683-1
https://ubuntu.com/security/notices/USN-4751-1
https://www.openwall.com/lists/oss-security/2020/11/09/2
| +| kernel-headers | CVE-2020-29374 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
https://access.redhat.com/security/cve/CVE-2020-29374
https://bugs.chromium.org/p/project-zero/issues/detail?id=2045
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
https://git.kernel.org/linus/17839856fd588f4ab6b789f482ed3ffd7c403e1f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29374
https://security.netapp.com/advisory/ntap-20210115-0002/
https://ubuntu.com/security/notices/USN-4748-1
https://ubuntu.com/security/notices/USN-4749-1
https://www.debian.org/security/2022/dsa-5096
| +| kernel-headers | CVE-2020-36158 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-36158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c455c5ab332773464d02ba17015acdca198f03d
https://git.kernel.org/linus/5c455c5ab332773464d02ba17015acdca198f03d (5.11-rc1)
https://github.com/torvalds/linux/commit/5c455c5ab332773464d02ba17015acdca198f03d
https://linux.oracle.com/cve/CVE-2020-36158.html
https://linux.oracle.com/errata/ELSA-2021-9043.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCHBIRS27VMOGMBHPWP2R7SZRFXT6O6U/
https://lore.kernel.org/r/20201206084801.26479-1-ruc_zhangxiaohui@163.com
https://nvd.nist.gov/vuln/detail/CVE-2020-36158
https://patchwork.kernel.org/project/linux-wireless/patch/20201206084801.26479-1-ruc_zhangxiaohui@163.com/
https://security.netapp.com/advisory/ntap-20210212-0002/
https://ubuntu.com/security/notices/USN-4876-1
https://ubuntu.com/security/notices/USN-4877-1
https://ubuntu.com/security/notices/USN-4878-1
https://ubuntu.com/security/notices/USN-4879-1
https://ubuntu.com/security/notices/USN-4912-1
https://www.debian.org/security/2021/dsa-4843
| +| kernel-headers | CVE-2020-36386 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-36386
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36386
https://git.kernel.org/linus/51c19bf3d5cfaa66571e4b88ba2a6f6295311101
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101
https://linux.oracle.com/cve/CVE-2020-36386.html
https://linux.oracle.com/errata/ELSA-2021-9346.html
https://sites.google.com/view/syzscope/kasan-slab-out-of-bounds-read-in-hci_extended_inquiry_result_evt
https://syzkaller.appspot.com/bug?id=4bf11aa05c4ca51ce0df86e500fce486552dc8d2
https://syzkaller.appspot.com/text?tag=ReproC&x=15ca2f46900000
| +| kernel-headers | CVE-2020-36516 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-36516
https://dl.acm.org/doi/10.1145/3372297.3417884
https://linux.oracle.com/cve/CVE-2020-36516.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://security.netapp.com/advisory/ntap-20220331-0003/
https://www.spinics.net/lists/netdev/msg795642.html
| +| kernel-headers | CVE-2020-3702 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-3702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/linux-wireless/CABvG-CVvPF++0vuGzCrBj8+s=Bcx1GwWfiW1_Somu_GVncTAcQ@mail.gmail.com/
https://lore.kernel.org/stable/20210818084859.vcs4vs3yd6zetmyt@pali/t/#mf8b430d4f19f1b939a29b6c5098fdc514fd1a928
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5361-1
https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58
https://www.debian.org/security/2021/dsa-4978
https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
| +| kernel-headers | CVE-2020-4788 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2020/11/20/3
http://www.openwall.com/lists/oss-security/2020/11/23/1
https://access.redhat.com/security/cve/CVE-2020-4788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4788
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/189296
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dda3f4252e6c8b833a2ef164afd3da9808d0f07c
https://linux.oracle.com/cve/CVE-2020-4788.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TITJQPYDWZ4NB2ONJWUXW75KSQIPF35T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZF4OGZPKTAJJXWHPIFP3LHEWWEMR5LPT/
https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4659-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4681-1
https://www.ibm.com/support/pages/node/6370729
https://www.openwall.com/lists/oss-security/2020/11/20/3
| +| kernel-headers | CVE-2020-8647 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html
https://access.redhat.com/security/cve/CVE-2020-8647
https://bugzilla.kernel.org/show_bug.cgi?id=206359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
https://linux.oracle.com/cve/CVE-2020-8647.html
https://linux.oracle.com/errata/ELSA-2020-5691.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8647
https://usn.ubuntu.com/lsn/0066-1/
https://www.debian.org/security/2020/dsa-4698
| +| kernel-headers | CVE-2020-8648 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.31.1.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2020-8648
https://bugzilla.kernel.org/show_bug.cgi?id=206361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
https://linux.oracle.com/cve/CVE-2020-8648.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8648
https://security.netapp.com/advisory/ntap-20200924-0004/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
https://usn.ubuntu.com/lsn/0066-1/
https://www.debian.org/security/2020/dsa-4698
| +| kernel-headers | CVE-2020-8649 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html
https://access.redhat.com/security/cve/CVE-2020-8649
https://bugzilla.kernel.org/show_bug.cgi?id=206357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
https://linux.oracle.com/cve/CVE-2020-8649.html
https://linux.oracle.com/errata/ELSA-2020-5691.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8649
https://usn.ubuntu.com/lsn/0066-1/
https://www.debian.org/security/2020/dsa-4698
| +| kernel-headers | CVE-2020-8694 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-8694
https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8694
https://linux.oracle.com/cve/CVE-2020-8694.html
https://linux.oracle.com/errata/ELSA-2020-5996.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
https://platypusattack.com/
https://ubuntu.com/security/notices/USN-4626-1
https://ubuntu.com/security/notices/USN-4627-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Platypus
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html
| +| kernel-headers | CVE-2020-8832 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-8832
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1862840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8832
https://security.netapp.com/advisory/ntap-20200430-0004/
https://ubuntu.com/security/notices/USN-4302-1
https://usn.ubuntu.com/usn/usn-4302-1
| +| kernel-headers | CVE-2020-9383 | MEDIUM | 3.10.0-1062.7.1.el7 | 4.14.0-115.21.2.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html
https://access.redhat.com/security/cve/CVE-2020-9383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
https://git.kernel.org/linus/2e90ca68b0d2f5548804f22f0dd61145516171e3
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=2f9ac30a54dc0181ddac3705cdcf4775d863c530
https://github.com/torvalds/linux/commit/2e90ca68b0d2f5548804f22f0dd61145516171e3
https://linux.oracle.com/cve/CVE-2020-9383.html
https://linux.oracle.com/errata/ELSA-2020-5676.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-9383
https://security.netapp.com/advisory/ntap-20200313-0003/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
https://www.debian.org/security/2020/dsa-4698
| +| kernel-headers | CVE-2021-0129 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-0129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f
https://linux.oracle.com/cve/CVE-2021-0129.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html
https://security.netapp.com/advisory/ntap-20210716-0002/
https://ubuntu.com/security/notices/USN-5017-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4951
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html
| +| kernel-headers | CVE-2021-0512 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-0512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0512
https://git.kernel.org/linus/ed9be64eefe26d7d8b0b5b9fa3ffdf425d87a01f
https://linux.oracle.com/cve/CVE-2021-0512.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/lkml/20210301161013.666159680@linuxfoundation.org/
https://source.android.com/security/bulletin/2021-06-01
| +| kernel-headers | CVE-2021-20219 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20219
https://bugzilla.redhat.com/show_bug.cgi?id=1923738
https://linux.oracle.com/cve/CVE-2021-20219.html
https://linux.oracle.com/errata/ELSA-2021-9215.html
| +| kernel-headers | CVE-2021-20261 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20261
https://bugzilla.redhat.com/show_bug.cgi?id=1932150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20261
https://git.kernel.org/linus/a0c80efe5956ccce9fe7ae5c78542578c07bc20a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a0c80efe5956ccce9fe7ae5c78542578c07bc20a
https://linux.oracle.com/cve/CVE-2021-20261.html
https://linux.oracle.com/errata/ELSA-2021-9215.html
https://ubuntu.com/security/notices/USN-4904-1
| +| kernel-headers | CVE-2021-20317 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20317.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43267.json
https://access.redhat.com/security/cve/CVE-2021-20317
https://bugzilla.redhat.com/show_bug.cgi?id=2005258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
https://git.kernel.org/linus/511885d7061eda3eb1faf3f57dcc936ff75863f1 (5.4-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=511885d7061eda3eb1faf3f57dcc936ff75863f1
https://linux.oracle.com/cve/CVE-2021-20317.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5096
| +| kernel-headers | CVE-2021-20320 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20320
https://bugzilla.redhat.com/show_bug.cgi?id=2010090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320
https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-20320
| +| kernel-headers | CVE-2021-20321 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20321
https://bugzilla.redhat.com/show_bug.cgi?id=2013242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)
https://linux.oracle.com/cve/CVE-2021-20321.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-20321
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
| +| kernel-headers | CVE-2021-20322 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20322
https://bugzilla.redhat.com/show_bug.cgi?id=2014230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
https://linux.oracle.com/cve/CVE-2021-20322.html
https://linux.oracle.com/errata/ELSA-2022-9260.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20322
https://security.netapp.com/advisory/ntap-20220303-0002/
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
| +| kernel-headers | CVE-2021-23133 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/10/1
http://www.openwall.com/lists/oss-security/2021/05/10/2
http://www.openwall.com/lists/oss-security/2021/05/10/3
http://www.openwall.com/lists/oss-security/2021/05/10/4
https://access.redhat.com/security/cve/CVE-2021-23133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23133
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
https://linux.oracle.com/cve/CVE-2021-23133.html
https://linux.oracle.com/errata/ELSA-2021-9363.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/
https://nvd.nist.gov/vuln/detail/CVE-2021-23133
https://security.netapp.com/advisory/ntap-20210611-0008/
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5003-1
https://www.openwall.com/lists/oss-security/2021/04/18/2
| +| kernel-headers | CVE-2021-28711 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-28711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
| +| kernel-headers | CVE-2021-28712 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-28712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
| +| kernel-headers | CVE-2021-28713 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-28713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
| +| kernel-headers | CVE-2021-28964 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-28964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28964
https://git.kernel.org/linus/dbcc7d57bffc0c8cac9dac11bec548597d59a6a5
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5
https://linux.oracle.com/cve/CVE-2021-28964.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2021-28964
https://security.netapp.com/advisory/ntap-20210430-0003/
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5361-1
| +| kernel-headers | CVE-2021-28972 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-28972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28972
https://git.kernel.org/linus/cc7a0bb058b85ea03db87169c60c7cfdd5d34678
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2021-28972
https://security.netapp.com/advisory/ntap-20210430-0003/
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
| +| kernel-headers | CVE-2021-29155 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-29155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29155
https://linux.oracle.com/cve/CVE-2021-29155.html
https://linux.oracle.com/errata/ELSA-2021-9363.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/
https://nvd.nist.gov/vuln/detail/CVE-2021-29155
https://ubuntu.com/security/notices/USN-4977-1
https://ubuntu.com/security/notices/USN-4983-1
https://ubuntu.com/security/notices/USN-4999-1
https://www.kernel.org
https://www.openwall.com/lists/oss-security/2021/04/18/4
| +| kernel-headers | CVE-2021-30002 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-30002
https://bugzilla.suse.com/show_bug.cgi?id=1184120
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://git.kernel.org/linus/fb18802a338b36f675a388fc03d2aa504a0d0899
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2021-30002
https://ubuntu.com/security/notices/USN-4945-1
https://ubuntu.com/security/notices/USN-4945-2
https://ubuntu.com/security/notices/USN-4946-1
https://ubuntu.com/security/notices/USN-4947-1
https://ubuntu.com/security/notices/USN-4984-1
| +| kernel-headers | CVE-2021-3178 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3178
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51b2ee7d006a736a9126e8111d1f24e4fd0afaa6
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SGB7TNDVQEOJ7NVTGX56UWHDNQM5TRC/
https://nvd.nist.gov/vuln/detail/CVE-2021-3178
https://patchwork.kernel.org/project/linux-nfs/patch/20210111210129.GA11652@fieldses.org/
https://ubuntu.com/security/notices/USN-4876-1
https://ubuntu.com/security/notices/USN-4877-1
https://ubuntu.com/security/notices/USN-4878-1
https://ubuntu.com/security/notices/USN-4910-1
https://ubuntu.com/security/notices/USN-4912-1
| +| kernel-headers | CVE-2021-31829 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/04/4
https://access.redhat.com/security/cve/CVE-2021-31829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31829
https://github.com/torvalds/linux/commit/801c6058d14a82179a7ee17a4b532cac6fad067f
https://linux.oracle.com/cve/CVE-2021-31829.html
https://linux.oracle.com/errata/ELSA-2021-9363.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWCZ6LJLENL2C3URW5ICARTACXPFCFN2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4X2G5YAPYJGI3PFEZZNOTRYI33GOCCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZI7OBCJQDNWMKLBP6MZ5NV4EUTDAMX6Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-31829
https://ubuntu.com/security/notices/USN-4983-1
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5018-1
https://www.openwall.com/lists/oss-security/2021/05/04/4
| +| kernel-headers | CVE-2021-33098 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33098
https://security.netapp.com/advisory/ntap-20211210-0005/
https://ubuntu.com/security/notices/USN-5343-1
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html
| +| kernel-headers | CVE-2021-33150 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33150
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00609.html
| +| kernel-headers | CVE-2021-33200 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33200
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e
https://linux.oracle.com/cve/CVE-2021-33200.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LR3OKKPHIBGOMHN476CMLW2T7UG53QX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJCABL43FT3FKRX5DBPZG25FNKR6CEK4/
https://nvd.nist.gov/vuln/detail/CVE-2021-33200
https://security.netapp.com/advisory/ntap-20210706-0004/
https://ubuntu.com/security/notices/USN-4983-1
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5018-1
https://www.openwall.com/lists/oss-security/2021/05/27/1
| +| kernel-headers | CVE-2021-33624 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/06/21/1
https://access.redhat.com/security/cve/CVE-2021-33624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9183671af6dbf60a1219371d4ed73e23f43b49db
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=973377ffe8148180b2651825b92ae91988141b05
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d203b0fd863a2261e5d00b97f3d060c4c2a6db71
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fe9a5ca7e370e613a9a75a13008a3845ea759d6e
https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://nvd.nist.gov/vuln/detail/CVE-2021-33624
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5115-1
https://www.openwall.com/lists/oss-security/2021/06/21/1
https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner
| +| kernel-headers | CVE-2021-34556 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/01/3
https://access.redhat.com/security/cve/CVE-2021-34556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/
https://nvd.nist.gov/vuln/detail/CVE-2021-34556
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/08/01/3
| +| kernel-headers | CVE-2021-34693 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/06/15/1
https://access.redhat.com/security/cve/CVE-2021-34693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693
https://linux.oracle.com/cve/CVE-2021-34693.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html
https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-34693
https://ubuntu.com/security/notices/USN-5045-1
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5073-3
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4941
https://www.openwall.com/lists/oss-security/2021/06/15/1
| +| kernel-headers | CVE-2021-34866 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-34866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34866
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=5b029a32cfe4600f5e10e36b41778506b90fd4de
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5b029a32cfe4600f5e10e36b41778506b90fd4de
https://security.netapp.com/advisory/ntap-20220217-0008/
https://www.zerodayinitiative.com/advisories/ZDI-21-1148/
| +| kernel-headers | CVE-2021-34981 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-34981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981
https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479
https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
| +| kernel-headers | CVE-2021-35477 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/
https://nvd.nist.gov/vuln/detail/CVE-2021-35477
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/08/01/3
| +| kernel-headers | CVE-2021-3564 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 |
Expand...http://www.openwall.com/lists/oss-security/2021/05/25/1
http://www.openwall.com/lists/oss-security/2021/06/01/2
https://access.redhat.com/security/cve/CVE-2021-3564
https://bugzilla.redhat.com/show_bug.cgi?id=1964139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564
https://linux.oracle.com/cve/CVE-2021-3564.html
https://linux.oracle.com/errata/ELSA-2022-0620.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-bluetooth/20210525123902.189012-1-gregkh@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-3564
https://ubuntu.com/security/notices/USN-5015-1
https://ubuntu.com/security/notices/USN-5044-1
https://ubuntu.com/security/notices/USN-5045-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2021/05/25/1
| +| kernel-headers | CVE-2021-3573 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-3573
https://bugzilla.redhat.com/show_bug.cgi?id=1966578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52
https://linux.oracle.com/cve/CVE-2021-3573.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3573
https://ubuntu.com/security/notices/USN-5015-1
https://ubuntu.com/security/notices/USN-5044-1
https://ubuntu.com/security/notices/USN-5045-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2021/06/08/2
| +| kernel-headers | CVE-2021-3600 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-3600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600
https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90
https://linux.oracle.com/cve/CVE-2021-3600.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://lore.kernel.org/patchwork/patch/1379497/
https://ubuntu.com/security/notices/USN-5003-1
https://www.openwall.com/lists/oss-security/2021/06/23/1
| +| kernel-headers | CVE-2021-3609 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3609
https://bugzilla.redhat.com/show_bug.cgi?id=1971651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609
https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md
https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463
https://linux.oracle.com/cve/CVE-2021-3609.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lore.kernel.org/netdev/20210618071532.kr7o2rnx6ia4t6n6@pengutronix.de/T/#t
https://lore.kernel.org/netdev/20210619161813.2098382-1-cascardo@canonical.com/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-3609
https://security.netapp.com/advisory/ntap-20220419-0004/
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5002-1
https://ubuntu.com/security/notices/USN-5003-1
https://ubuntu.com/security/notices/USN-5082-1
https://www.openwall.com/lists/oss-security/2021/06/19/1
| +| kernel-headers | CVE-2021-3612 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3612
https://bugzilla.redhat.com/show_bug.cgi?id=1974079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3612.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/
https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/
https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/T/#u
https://security.netapp.com/advisory/ntap-20210805-0005/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5071-3
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5073-3
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
| +| kernel-headers | CVE-2021-3640 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3640
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://linux.oracle.com/cve/CVE-2021-3640.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lkml.org/lkml/2021/8/28/238
https://nvd.nist.gov/vuln/detail/CVE-2021-3640
https://security.netapp.com/advisory/ntap-20220419-0003/
https://ubuntu.com/security/CVE-2021-3640
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/07/22/1
https://x-lore.kernel.org/all/15f5a46.b79d9.17ba6802ccd.Coremail.linma@zju.edu.cn/
https://x-lore.kernel.org/all/20210810041410.142035-1-desmondcheongzx@gmail.com/
https://x-lore.kernel.org/all/20210828161818.31141-1-tiwai@suse.de/
| +| kernel-headers | CVE-2021-3653 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.45.1.el7 |
Expand...http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
https://access.redhat.com/security/cve/CVE-2021-3653
https://bugzilla.redhat.com/show_bug.cgi?id=1983686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653
https://github.com/torvalds/linux/commit/3d6368ef580a
https://linux.oracle.com/cve/CVE-2021-3653.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3653
https://ubuntu.com/security/notices/USN-5062-1
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5072-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5082-1
https://www.openwall.com/lists/oss-security/2021/08/16/1
| +| kernel-headers | CVE-2021-3655 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3655
https://bugzilla.redhat.com/show_bug.cgi?id=1984024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f9beb95e6a2669fa35e34a6ff52808b181efa20f
https://linux.oracle.com/cve/CVE-2021-3655.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/netdev/599e6c1fdcc50f16597380118c9b3b6790241d50.1627439903.git.marcelo.leitner@gmail.com/
https://lore.kernel.org/netdev/e39b372644b6e5bf48df25e54b9172f34ec223a1.1624904195.git.marcelo.leitner@gmail.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-3655
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
| +| kernel-headers | CVE-2021-3656 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.45.1.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3656
https://bugzilla.redhat.com/show_bug.cgi?id=1983988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656
https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
https://github.com/torvalds/linux/commit/89c8a4984fc9
https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
https://linux.oracle.com/cve/CVE-2021-3656.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3656
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5072-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5082-1
https://www.openwall.com/lists/oss-security/2021/08/16/1
| +| kernel-headers | CVE-2021-3669 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3669.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| +| kernel-headers | CVE-2021-3714 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3714
https://arxiv.org/abs/2111.08553
https://arxiv.org/pdf/2111.08553.pdf
| +| kernel-headers | CVE-2021-3715 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3715
https://bugzilla.redhat.com/show_bug.cgi?id=1993988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715
https://git.kernel.org/linus/ef299cc3fa1a9e1288665a9fdc8bff55629fd359 (5.6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359
https://github.com/torvalds/linux/commit/ef299cc3fa1a9e1288665a9fdc8bff55629fd359
https://linux.oracle.com/cve/CVE-2021-3715.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://www.openwall.com/lists/oss-security/2021/09/07/1
| +| kernel-headers | CVE-2021-37159 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-37159.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/linux-usb/20201002114323.GA3296553@kroah.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-37159
https://security.netapp.com/advisory/ntap-20210819-0003/
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.spinics.net/lists/linux-usb/msg202228.html
| +| kernel-headers | CVE-2021-3744 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/09/14/1
https://access.redhat.com/security/cve/CVE-2021-3744
https://bugzilla.redhat.com/show_bug.cgi?id=2000627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680
https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0
https://linux.oracle.com/cve/CVE-2021-3744.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-3744
https://seclists.org/oss-sec/2021/q3/164
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
https://www.debian.org/security/2022/dsa-5096
| +| kernel-headers | CVE-2021-3752 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3752
https://bugzilla.redhat.com/show_bug.cgi?id=1999544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3752.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-3752
https://security.netapp.com/advisory/ntap-20220318-0009/
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/09/15/4
| +| kernel-headers | CVE-2021-3753 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3753
https://bugzilla.redhat.com/show_bug.cgi?id=1999589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753
https://git.kernel.org/linus/2287a51ba822384834dafc1c798453375d1107c7
https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7
https://linux.oracle.com/cve/CVE-2021-3753.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3753
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/09/01/4
| +| kernel-headers | CVE-2021-3764 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe
https://linux.oracle.com/cve/CVE-2021-3764.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
| +| kernel-headers | CVE-2021-3772 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3772
https://bugzilla.redhat.com/show_bug.cgi?id=2000694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://linux.oracle.com/cve/CVE-2021-3772.html
https://linux.oracle.com/errata/ELSA-2022-9260.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3772
https://ubuntu.com/security/CVE-2021-3772
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5265-1
https://www.debian.org/security/2022/dsa-5096
| +| kernel-headers | CVE-2021-3773 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3773
https://bugzilla.redhat.com/show_bug.cgi?id=2004949
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3773.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3773
| +| kernel-headers | CVE-2021-39636 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-39636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39636
https://source.android.com/security/bulletin/pixel/2021-12-01
https://ubuntu.com/security/notices/USN-5361-1
| +| kernel-headers | CVE-2021-39713 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-39713
https://android.googlesource.com/kernel/common/+/3a7d0d07a3867
https://android.googlesource.com/kernel/common/+/6f99528e97977
https://android.googlesource.com/kernel/common/+/86bd446b5cebd
https://android.googlesource.com/kernel/common/+/9d7e82cec35c0
https://android.googlesource.com/kernel/common/+/e368fdb61d8e7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
https://source.android.com/security/bulletin/pixel/2022-03-01
https://syzkaller.appspot.com/bug?id=d7e411c5472dd5da33d8cc921ccadc747743a568
https://ubuntu.com/security/notices/USN-5413-1
| +| kernel-headers | CVE-2021-4002 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-4002
https://bugzilla.redhat.com/show_bug.cgi?id=2025726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890
https://linux.oracle.com/cve/CVE-2021-4002.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-4002
https://ubuntu.com/security/notices/USN-5206-1
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5211-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/11/25/1
| +| kernel-headers | CVE-2021-4032 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4032
https://bugzilla.redhat.com/show_bug.cgi?id=2027403
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7d8a19f9a056a05c5c509fa65af472a322abfee
https://lkml.org/lkml/2021/9/8/587
https://nvd.nist.gov/vuln/detail/CVE-2021-4032
| +| kernel-headers | CVE-2021-40490 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-40490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa
https://linux.oracle.com/cve/CVE-2021-40490.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/
https://lore.kernel.org/linux-ext4/000000000000e5080305c9e51453@google.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-40490
https://security.netapp.com/advisory/ntap-20211004-0001/
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4978
| +| kernel-headers | CVE-2021-4148 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4148
https://bugzilla.redhat.com/show_bug.cgi?id=2026487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148
https://lkml.org/lkml/2021/9/12/323
https://lkml.org/lkml/2021/9/17/1037
https://lore.kernel.org/linux-mm/a07564a3-b2fc-9ffe-3ace-3f276075ea5c@google.com/
https://lore.kernel.org/lkml/CACkBjsYwLYLRmX8GpsDpMthagWOjWWrNxqY6ZLNQVr6yx+f5vA@mail.gmail.com/
https://lore.kernel.org/lkml/CAHbLzkrdGva2dzO36r62LKv_ip5trbMK0BO3vCeSBk2_7OE-zA@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-4148
| +| kernel-headers | CVE-2021-4149 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4149
https://bugzilla.redhat.com/show_bug.cgi?id=2026485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149
https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)
https://linux.oracle.com/cve/CVE-2021-4149.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lkml.org/lkml/2021/10/18/885
https://lkml.org/lkml/2021/9/13/2565
https://nvd.nist.gov/vuln/detail/CVE-2021-4149
| +| kernel-headers | CVE-2021-4157 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4157
https://bugzilla.redhat.com/show_bug.cgi?id=2034342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4157
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/ed34695e15aba74f45247f1ee2cf7e09d449f925 (5.13-rc1)
https://linux.oracle.com/cve/CVE-2021-4157.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-4157
https://ubuntu.com/security/notices/USN-5413-1
| +| kernel-headers | CVE-2021-4159 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159
| +| kernel-headers | CVE-2021-41864 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-41864
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a
https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a
https://linux.oracle.com/cve/CVE-2021-41864.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-41864
https://security.netapp.com/advisory/ntap-20211029-0004/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
| +| kernel-headers | CVE-2021-4203 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4203
https://bugs.chromium.org/p/project-zero/issues/detail?id=2230
https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1
https://bugzilla.redhat.com/show_bug.cgi?id=2036934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/35306eb23814444bd4021f8a1c3047d3cb0c8b2b (5.15-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814
https://linux.oracle.com/cve/CVE-2021-4203.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-4203
| +| kernel-headers | CVE-2021-4204 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/impish/commit/?id=53fb7741ff9d546174dbb585957b4f8b6afbdb83
https://ubuntu.com/security/notices/USN-5217-1
https://ubuntu.com/security/notices/USN-5218-1
https://ubuntu.com/security/notices/USN-5219-1
https://www.openwall.com/lists/oss-security/2022/01/11/4
| +| kernel-headers | CVE-2021-43056 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/10/28/1
https://access.redhat.com/security/cve/CVE-2021-43056
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 (5.15-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://linux.oracle.com/cve/CVE-2021-43056.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AA7EAPPKWG4LMTQQLNNSKATY6ST2KQFE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBM4FP3IT3JZ2O7EBS7TEOG657N4ZGRE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRAIS3PG4EV5WFLYESR6FXWM4BJJGWVA/
https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf@mpe.ellerman.id.au/T/#u
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
| +| kernel-headers | CVE-2021-43975 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-43975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-43975
https://security.netapp.com/advisory/ntap-20211210-0001/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5385-1
https://www.debian.org/security/2022/dsa-5096
| +| kernel-headers | CVE-2021-43976 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-43976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84
https://linux.oracle.com/cve/CVE-2021-43976.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://nvd.nist.gov/vuln/detail/CVE-2021-43976
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
https://security.netapp.com/advisory/ntap-20211210-0001/
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://ubuntu.com/security/notices/USN-5361-1
https://ubuntu.com/security/notices/USN-5377-1
https://ubuntu.com/security/notices/USN-5383-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
| +| kernel-headers | CVE-2021-45485 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45485
https://arxiv.org/pdf/2112.09604.pdf
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/62f20e068ccc50d6ab66fdb72ba90da2b9418c99 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99
https://linux.oracle.com/cve/CVE-2021-45485.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/
https://nvd.nist.gov/vuln/detail/CVE-2021-45485
https://security.netapp.com/advisory/ntap-20220121-0001/
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
| +| kernel-headers | CVE-2021-45486 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45486
https://arxiv.org/pdf/2112.09604.pdf
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45486
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba (5.13-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba
https://linux.oracle.com/cve/CVE-2021-45486.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45486
https://ubuntu.com/security/notices/USN-5361-1
| +| kernel-headers | CVE-2021-45868 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45868
https://bugzilla.kernel.org/show_bug.cgi?id=214655
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45868
https://git.kernel.org/linus/9bf3d20331295b1ecb81f4ed9ef358c51699a050
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050
https://linux.oracle.com/cve/CVE-2021-45868.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45868
https://security.netapp.com/advisory/ntap-20220419-0003/
https://www.openwall.com/lists/oss-security/2022/03/17/1
https://www.openwall.com/lists/oss-security/2022/03/17/2
| +| kernel-headers | CVE-2022-0480 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0480
https://bugzilla.redhat.com/show_bug.cgi?id=2049700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480
https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)
https://github.com/kata-containers/kata-containers/issues/3373
https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
| +| kernel-headers | CVE-2022-0494 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0494
https://bugzilla.redhat.com/show_bug.cgi?id=2039448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
https://git.kernel.org/linus/cc8f7fe1f5eab010191aa4570f27641876fa1267 (5.17-rc5)
https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-0494
https://ubuntu.com/security/notices/USN-5381-1
| +| kernel-headers | CVE-2022-0617 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/13/2
https://access.redhat.com/security/cve/CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://git.kernel.org/linus/7fc3b7c2981bbd1047916ade327beccb90994eee
https://git.kernel.org/linus/ea8569194b43f0f01f0a84c689388542c7254a1f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f
https://linux.oracle.com/cve/CVE-2022-0617.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/
https://nvd.nist.gov/vuln/detail/CVE-2022-0617
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5384-1
https://ubuntu.com/security/notices/USN-5385-1
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
| +| kernel-headers | CVE-2022-0812 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0812
https://bugzilla.redhat.com/show_bug.cgi?id=2058361
https://twitter.com/iMilnb/status/1497125078252806161
| +| kernel-headers | CVE-2022-0850 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0850
https://bugzilla.redhat.com/show_bug.cgi?id=2060606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe
https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8
| +| kernel-headers | CVE-2022-0854 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
https://nvd.nist.gov/vuln/detail/CVE-2022-0854
https://ubuntu.com/security/notices/USN-5381-1
| +| kernel-headers | CVE-2022-1011 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1011
https://bugzilla.redhat.com/show_bug.cgi?id=2064855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/0c4bcfdecb1ac0967619ee7ff44871d93c08c909 (5.17-rc8)
https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next
https://linux.oracle.com/cve/CVE-2022-1011.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-1011
https://ubuntu.com/security/notices/USN-5381-1
| +| kernel-headers | CVE-2022-1016 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
https://access.redhat.com/security/cve/CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://linux.oracle.com/cve/CVE-2022-1016.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://seclists.org/oss-sec/2022/q1/205
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5390-1
https://ubuntu.com/security/notices/USN-5390-2
https://ubuntu.com/security/notices/USN-5415-1
https://www.openwall.com/lists/oss-security/2022/03/28/5
| +| kernel-headers | CVE-2022-1263 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1263
| +| kernel-headers | CVE-2022-1353 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1353
https://bugzilla.redhat.com/show_bug.cgi?id=2066819
https://github.com/torvalds/linux/commit/9a564bccb78a76740ea9d75a259942df8143d02c
https://nvd.nist.gov/vuln/detail/CVE-2022-1353
https://www.debian.org/security/2022/dsa-5127
| +| kernel-headers | CVE-2022-1652 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1652
| +| kernel-headers | CVE-2022-1679 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1679
https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/
| +| kernel-headers | CVE-2022-1734 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1734
https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098
| +| kernel-headers | CVE-2022-23222 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/14/1
http://www.openwall.com/lists/oss-security/2022/01/18/2
https://access.redhat.com/security/cve/CVE-2022-23222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCR3LIRUEXR7CA63W5M2HT3K63MZGKBR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z5VTIZZUPC73IEJNZX66BY2YCBRZAELB/
https://nvd.nist.gov/vuln/detail/CVE-2022-23222
https://security.netapp.com/advisory/ntap-20220217-0002/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5362-1
https://ubuntu.com/security/notices/USN-5368-1
https://www.debian.org/security/2022/dsa-5050
https://www.openwall.com/lists/oss-security/2022/01/13/1
| +| kernel-headers | CVE-2022-25265 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-25265
https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294
https://github.com/x0reaxeax/exec-prot-bypass
https://nvd.nist.gov/vuln/detail/CVE-2022-25265
https://security.netapp.com/advisory/ntap-20220318-0005/
| +| kernel-headers | CVE-2022-25375 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/02/21/1
https://access.redhat.com/security/cve/CVE-2022-25375
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
https://git.kernel.org/linus/38ea1eac7d88072bbffb630e2b3db83ca649b826 (5.17-rc4)
https://github.com/szymonh/rndis-co
https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2022-25375
https://ubuntu.com/security/notices/USN-5415-1
https://ubuntu.com/security/notices/USN-5417-1
https://ubuntu.com/security/notices/USN-5418-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
| +| kernel-headers | CVE-2022-28356 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/06/1
https://access.redhat.com/security/cve/CVE-2022-28356
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
https://git.kernel.org/linus/764f4eb6846f5475f1244767d24d25dd86528a4a
https://github.com/torvalds/linux/commit/764f4eb6846f5475f1244767d24d25dd86528a4a
https://nvd.nist.gov/vuln/detail/CVE-2022-28356
https://security.netapp.com/advisory/ntap-20220506-0006/
https://ubuntu.com/security/notices/USN-5381-1
https://www.debian.org/security/2022/dsa-5127
https://www.openwall.com/lists/oss-security/2022/04/06/1
| +| kernel-headers | CVE-2022-28388 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-28388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
https://git.kernel.org/linus/3d3925ff6433f98992685a9679613a2cc97f3ce2 (5.18-rc1)
https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28388
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5416-1
https://www.debian.org/security/2022/dsa-5127
| +| kernel-headers | CVE-2022-28389 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-28389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
https://git.kernel.org/linus/04c9b00ba83594a29813d6b1fb8fdc93a3915174 (5.18-rc1)
https://github.com/torvalds/linux/commit/04c9b00ba83594a29813d6b1fb8fdc93a3915174
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28389
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5416-1
https://www.debian.org/security/2022/dsa-5127
| +| kernel-headers | CVE-2022-28390 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://git.kernel.org/linus/c70222752228a62135cee3409dccefd494a24646 (5.18-rc1)
https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28390
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5416-1
https://www.debian.org/security/2022/dsa-5127
| +| kernel-headers | CVE-2022-28796 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-28796
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1
https://github.com/torvalds/linux/commit/cc16eecae687912238ee6efbff71ad31e2bc414e
https://nvd.nist.gov/vuln/detail/CVE-2022-28796
https://security.netapp.com/advisory/ntap-20220506-0006/
| +| kernel-headers | CVE-2022-28893 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/11/3
http://www.openwall.com/lists/oss-security/2022/04/11/4
http://www.openwall.com/lists/oss-security/2022/04/11/5
https://access.redhat.com/security/cve/CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a
https://github.com/torvalds/linux/commit/f00432063db1a0db484e85193eccc6845435b80e
https://nvd.nist.gov/vuln/detail/CVE-2022-28893
https://security.netapp.com/advisory/ntap-20220526-0002/
https://www.openwall.com/lists/oss-security/2022/04/11/3
https://www.openwall.com/lists/oss-security/2022/04/11/5
| +| kernel-headers | CVE-2022-29156 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29156
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29156
https://github.com/torvalds/linux/commit/8700af2cc18c919b2a83e74e0479038fd113c15d
https://nvd.nist.gov/vuln/detail/CVE-2022-29156
https://ubuntu.com/security/notices/USN-5417-1
| +| kernel-headers | CVE-2022-29581 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/05/18/2
https://access.redhat.com/security/cve/CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8
https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8
https://nvd.nist.gov/vuln/detail/CVE-2022-29581
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5443-1
https://ubuntu.com/security/notices/USN-5444-1
| +| kernel-headers | CVE-2022-29968 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29968
https://github.com/torvalds/linux/commit/32452a3eb8b64e01e2be717f518c0be046975b9d
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LU7MT7BPTA2NG24BTLZF5ZWYTLSO7BU3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TLWTG3TWIMLNQEVTA3ZQYVLLU2AJM3DY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XA7UZ3HS73KXVYCIKN5ZDH7LLLGPUMOZ/
https://nvd.nist.gov/vuln/detail/CVE-2022-29968
| +| kernel-headers | CVE-2022-30594 | MEDIUM | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-30594
https://bugs.chromium.org/p/project-zero/issues/detail?id=2276
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee1fee900537b5d9560e9f937402de5ddc8412f3
https://git.kernel.org/linus/ee1fee900537b5d9560e9f937402de5ddc8412f3 (5.18-rc1)
https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3
https://nvd.nist.gov/vuln/detail/CVE-2022-30594
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5443-1
| +| kernel-headers | CVE-2014-0131 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1fd819ecb90cc9b822cd84d3056ddba315d3340f
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
http://www.openwall.com/lists/oss-security/2014/03/10/4
http://www.spinics.net/lists/netdev/msg274250.html
http://www.spinics.net/lists/netdev/msg274316.html
https://access.redhat.com/security/cve/CVE-2014-0131
https://bugzilla.redhat.com/show_bug.cgi?id=1074589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0131
https://github.com/torvalds/linux/commit/1fd819ecb90cc9b822cd84d3056ddba315d3340f
https://ubuntu.com/security/notices/USN-2283-1
https://ubuntu.com/security/notices/USN-2284-1
https://ubuntu.com/security/notices/USN-2285-1
https://ubuntu.com/security/notices/USN-2286-1
https://ubuntu.com/security/notices/USN-2287-1
https://ubuntu.com/security/notices/USN-2289-1
| +| kernel-headers | CVE-2014-2038 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=263b4509ec4d47e0da3e753f85a39ea12d1eff24
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.3
http://www.openwall.com/lists/oss-security/2014/02/20/16
http://www.ubuntu.com/usn/USN-2137-1
http://www.ubuntu.com/usn/USN-2140-1
https://access.redhat.com/security/cve/CVE-2014-2038
https://bugzilla.redhat.com/show_bug.cgi?id=1066939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2038
https://git.kernel.org/linus/263b4509ec4d47e0da3e753f85a39ea12d1eff24
https://github.com/torvalds/linux/commit/263b4509ec4d47e0da3e753f85a39ea12d1eff24
https://ubuntu.com/security/notices/USN-2137-1
https://ubuntu.com/security/notices/USN-2140-1
| +| kernel-headers | CVE-2014-8181 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2014-8181
https://bugzilla.redhat.com/show_bug.cgi?id=1335817
| +| kernel-headers | CVE-2014-9731 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
http://www.openwall.com/lists/oss-security/2015/06/03/4
http://www.securityfocus.com/bid/75001
https://access.redhat.com/security/cve/CVE-2014-9731
https://bugzilla.redhat.com/show_bug.cgi?id=1228220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9731
https://github.com/torvalds/linux/commit/0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
https://source.android.com/security/bulletin/2017-07-01
https://ubuntu.com/security/notices/USN-2517-1
https://ubuntu.com/security/notices/USN-2518-1
https://ubuntu.com/security/notices/USN-2541-1
https://ubuntu.com/security/notices/USN-2542-1
https://ubuntu.com/security/notices/USN-2543-1
https://ubuntu.com/security/notices/USN-2544-1
| +| kernel-headers | CVE-2015-1142857 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://seclists.org/oss-sec/2015/q4/425
https://access.redhat.com/security/cve/CVE-2015-1142857
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00046&languageid=en-fr
https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-smolyar.pdf
| +| kernel-headers | CVE-2015-1350 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://marc.info/?l=linux-kernel&m=142153722930533&w=2
http://www.openwall.com/lists/oss-security/2015/01/24/5
http://www.securityfocus.com/bid/76075
https://access.redhat.com/security/cve/CVE-2015-1350
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770492
https://bugzilla.redhat.com/show_bug.cgi?id=1185139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1350
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-4904-1
| +| kernel-headers | CVE-2015-1420 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://marc.info/?l=linux-kernel&m=142247707318982&w=2
http://www.debian.org/security/2015/dsa-3170
http://www.openwall.com/lists/oss-security/2015/01/29/12
http://www.securityfocus.com/bid/72357
http://www.ubuntu.com/usn/USN-2660-1
http://www.ubuntu.com/usn/USN-2661-1
http://www.ubuntu.com/usn/USN-2665-1
http://www.ubuntu.com/usn/USN-2667-1
https://access.redhat.com/security/cve/CVE-2015-1420
https://bugzilla.redhat.com/show_bug.cgi?id=1187534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1420
https://linux.oracle.com/cve/CVE-2015-1420.html
https://linux.oracle.com/errata/ELSA-2017-3516.html
https://ubuntu.com/security/notices/USN-2660-1
https://ubuntu.com/security/notices/USN-2661-1
https://ubuntu.com/security/notices/USN-2662-1
https://ubuntu.com/security/notices/USN-2663-1
https://ubuntu.com/security/notices/USN-2664-1
https://ubuntu.com/security/notices/USN-2665-1
https://ubuntu.com/security/notices/USN-2666-1
https://ubuntu.com/security/notices/USN-2667-1
| +| kernel-headers | CVE-2015-2877 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.antoniobarresi.com/files/cain_advisory.txt
http://www.kb.cert.org/vuls/id/935424
http://www.securityfocus.com/bid/76256
https://access.redhat.com/security/cve/CVE-2015-2877
https://bugzilla.redhat.com/show_bug.cgi?id=1252096
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
| +| kernel-headers | CVE-2015-3291 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=810bc075f78ff2c221536eb3008eac6a492dba2d
http://www.debian.org/security/2015/dsa-3313
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6
http://www.openwall.com/lists/oss-security/2015/07/22/7
http://www.securityfocus.com/bid/76003
http://www.ubuntu.com/usn/USN-2687-1
http://www.ubuntu.com/usn/USN-2688-1
http://www.ubuntu.com/usn/USN-2689-1
http://www.ubuntu.com/usn/USN-2690-1
http://www.ubuntu.com/usn/USN-2691-1
https://access.redhat.com/security/cve/CVE-2015-3291
https://bugzilla.redhat.com/show_bug.cgi?id=1243489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3291
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=810bc075f78ff2c221536eb3008eac6a492dba2d
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a27507ca2d796cfa8d907de31ad730359c8a6d06 (prerequisite)
https://github.com/torvalds/linux/commit/810bc075f78ff2c221536eb3008eac6a492dba2d
https://security-tracker.debian.org/tracker/CVE-2015-3291
https://ubuntu.com/security/notices/USN-2687-1
https://ubuntu.com/security/notices/USN-2688-1
https://ubuntu.com/security/notices/USN-2689-1
https://ubuntu.com/security/notices/USN-2690-1
https://ubuntu.com/security/notices/USN-2691-1
https://ubuntu.com/security/notices/USN-2700-1
https://ubuntu.com/security/notices/USN-2701-1
| +| kernel-headers | CVE-2015-5257 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbb4be652d374f64661137756b8f357a1827d6a4
http://www.debian.org/security/2015/dsa-3372
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.4
http://www.openwall.com/lists/oss-security/2015/09/23/1
http://www.securityfocus.com/bid/76834
http://www.ubuntu.com/usn/USN-2792-1
http://www.ubuntu.com/usn/USN-2794-1
http://www.ubuntu.com/usn/USN-2795-1
http://www.ubuntu.com/usn/USN-2798-1
http://www.ubuntu.com/usn/USN-2799-1
https://access.redhat.com/security/cve/CVE-2015-5257
https://bugzilla.redhat.com/show_bug.cgi?id=1265607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5257
https://github.com/torvalds/linux/commit/cbb4be652d374f64661137756b8f357a1827d6a4
https://linux.oracle.com/cve/CVE-2015-5257.html
https://linux.oracle.com/errata/ELSA-2017-3567.html
https://marc.info/?l=linux-usb&m=144303376328355
https://ubuntu.com/security/notices/USN-2792-1
https://ubuntu.com/security/notices/USN-2794-1
https://ubuntu.com/security/notices/USN-2795-1
https://ubuntu.com/security/notices/USN-2796-1
https://ubuntu.com/security/notices/USN-2797-1
https://ubuntu.com/security/notices/USN-2798-1
https://ubuntu.com/security/notices/USN-2799-1
| +| kernel-headers | CVE-2015-5697 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
http://www.debian.org/security/2015/dsa-3329
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6
http://www.openwall.com/lists/oss-security/2015/07/28/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/76066
http://www.securitytracker.com/id/1033211
http://www.ubuntu.com/usn/USN-2731-1
http://www.ubuntu.com/usn/USN-2732-1
http://www.ubuntu.com/usn/USN-2748-1
http://www.ubuntu.com/usn/USN-2749-1
http://www.ubuntu.com/usn/USN-2751-1
http://www.ubuntu.com/usn/USN-2752-1
http://www.ubuntu.com/usn/USN-2777-1
https://access.redhat.com/security/cve/CVE-2015-5697
https://bugzilla.redhat.com/show_bug.cgi?id=1249011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5697
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=77ba0569d4c8389c0a2162ab0c7c16a6f3b199e4
https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16
https://linux.oracle.com/cve/CVE-2015-5697.html
https://linux.oracle.com/errata/ELSA-2015-3068.html
https://ubuntu.com/security/notices/USN-2731-1
https://ubuntu.com/security/notices/USN-2732-1
https://ubuntu.com/security/notices/USN-2748-1
https://ubuntu.com/security/notices/USN-2749-1
https://ubuntu.com/security/notices/USN-2751-1
https://ubuntu.com/security/notices/USN-2752-1
https://ubuntu.com/security/notices/USN-2777-1
| +| kernel-headers | CVE-2015-6252 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2015/dsa-3364
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.5
http://www.openwall.com/lists/oss-security/2015/08/18/3
http://www.securityfocus.com/bid/76400
http://www.securitytracker.com/id/1033666
http://www.ubuntu.com/usn/USN-2748-1
http://www.ubuntu.com/usn/USN-2749-1
http://www.ubuntu.com/usn/USN-2751-1
http://www.ubuntu.com/usn/USN-2752-1
http://www.ubuntu.com/usn/USN-2759-1
http://www.ubuntu.com/usn/USN-2760-1
http://www.ubuntu.com/usn/USN-2777-1
https://access.redhat.com/security/cve/CVE-2015-6252
https://bugzilla.redhat.com/show_bug.cgi?id=1251839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6252
https://github.com/torvalds/linux/commit/7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5
https://linux.oracle.com/cve/CVE-2015-6252.html
https://linux.oracle.com/errata/ELSA-2017-3567.html
https://lkml.org/lkml/2015/8/10/375
https://ubuntu.com/security/notices/USN-2748-1
https://ubuntu.com/security/notices/USN-2749-1
https://ubuntu.com/security/notices/USN-2751-1
https://ubuntu.com/security/notices/USN-2752-1
https://ubuntu.com/security/notices/USN-2759-1
https://ubuntu.com/security/notices/USN-2760-1
https://ubuntu.com/security/notices/USN-2777-1
| +| kernel-headers | CVE-2015-7515 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e20cf2bce122ce9262d6034ee5d5b76fbb92f96
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3607
http://www.securityfocus.com/bid/84288
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
https://access.redhat.com/security/cve/CVE-2015-7515
https://bugzilla.redhat.com/show_bug.cgi?id=1285326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7515
https://github.com/torvalds/linux/commit/8e20cf2bce122ce9262d6034ee5d5b76fbb92f96
https://os-s.net/advisories/OSS-2016-05_aiptek.pdf
https://security-tracker.debian.org/tracker/CVE-2015-7515
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://www.exploit-db.com/exploits/39544/
| +| kernel-headers | CVE-2015-7566 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb3232138e37129e88240a98a1d2aba2187ff57c
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://marc.info/?l=linux-usb&m=145260786729359&w=2
http://www.debian.org/security/2016/dsa-3448
http://www.debian.org/security/2016/dsa-3503
http://www.securityfocus.com/archive/1/537733/100/0/threaded
http://www.securityfocus.com/bid/82975
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2015-7566
https://bugzilla.redhat.com/show_bug.cgi?id=1283371
https://bugzilla.redhat.com/show_bug.cgi?id=1296466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7566
https://github.com/torvalds/linux/commit/cb3232138e37129e88240a98a1d2aba2187ff57c
https://security-tracker.debian.org/tracker/CVE-2015-7566
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://www.exploit-db.com/exploits/39540/
| +| kernel-headers | CVE-2015-7799 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
http://www.debian.org/security/2015/dsa-3426
http://www.openwall.com/lists/oss-security/2015/10/09/1
http://www.openwall.com/lists/oss-security/2015/10/10/3
http://www.securityfocus.com/bid/77033
http://www.securitytracker.com/id/1033809
http://www.ubuntu.com/usn/USN-2841-1
http://www.ubuntu.com/usn/USN-2841-2
http://www.ubuntu.com/usn/USN-2842-1
http://www.ubuntu.com/usn/USN-2842-2
http://www.ubuntu.com/usn/USN-2843-1
http://www.ubuntu.com/usn/USN-2843-2
http://www.ubuntu.com/usn/USN-2843-3
http://www.ubuntu.com/usn/USN-2844-1
http://www.ubuntu.com/usn/USN-2886-1
https://access.redhat.com/security/cve/CVE-2015-7799
https://bugzilla.redhat.com/show_bug.cgi?id=1271134
https://code.google.com/p/android/issues/detail?id=187973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799
https://ubuntu.com/security/notices/USN-2841-1
https://ubuntu.com/security/notices/USN-2841-2
https://ubuntu.com/security/notices/USN-2842-1
https://ubuntu.com/security/notices/USN-2842-2
https://ubuntu.com/security/notices/USN-2843-1
https://ubuntu.com/security/notices/USN-2843-2
https://ubuntu.com/security/notices/USN-2843-3
https://ubuntu.com/security/notices/USN-2844-1
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
| +| kernel-headers | CVE-2015-7833 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
http://seclists.org/bugtraq/2015/Oct/35
http://www.debian.org/security/2015/dsa-3396
http://www.debian.org/security/2015/dsa-3426
http://www.os-s.net/advisories/DOS-KernelCrashesOnInvalidUSBDeviceDescriptors-UsbvisionDriver.pdf
http://www.securityfocus.com/archive/1/536629
http://www.securityfocus.com/bid/77030
http://www.securitytracker.com/id/1034452
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2947-1
http://www.ubuntu.com/usn/USN-2947-2
http://www.ubuntu.com/usn/USN-2947-3
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2015-7833
https://bugzilla.redhat.com/show_bug.cgi?id=1201858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2947-1
https://ubuntu.com/security/notices/USN-2947-2
https://ubuntu.com/security/notices/USN-2947-3
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
| +| kernel-headers | CVE-2015-8569 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ccfd238e5a0e670d8178cf50180ea81ae09ae1
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://twitter.com/grsecurity/statuses/676744240802750464
http://www.debian.org/security/2016/dsa-3434
http://www.openwall.com/lists/oss-security/2015/12/15/11
http://www.openwall.com/lists/oss-security/2015/12/15/7
http://www.securityfocus.com/bid/79428
http://www.securitytracker.com/id/1034549
http://www.ubuntu.com/usn/USN-2886-1
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
https://access.redhat.com/security/cve/CVE-2015-8569
https://bugzilla.redhat.com/show_bug.cgi?id=1292045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569
https://github.com/torvalds/linux/commit/09ccfd238e5a0e670d8178cf50180ea81ae09ae1
https://linux.oracle.com/cve/CVE-2015-8569.html
https://linux.oracle.com/errata/ELSA-2017-3534.html
https://lkml.org/lkml/2015/12/14/252
https://twitter.com/grsecurity/status/676744240802750464
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
https://ubuntu.com/security/notices/USN-2907-1
https://ubuntu.com/security/notices/USN-2907-2
https://ubuntu.com/security/notices/USN-2910-1
| +| kernel-headers | CVE-2015-8575 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5233252fce714053f0151680933571a2da9cbfb4
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3434
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4
http://www.openwall.com/lists/oss-security/2015/12/16/3
http://www.securityfocus.com/bid/79724
http://www.ubuntu.com/usn/USN-2886-1
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
https://access.redhat.com/security/cve/CVE-2015-8575
https://bugzilla.redhat.com/show_bug.cgi?id=1292840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5233252fce714053f0151680933571a2da9cbfb4
https://github.com/torvalds/linux/commit/5233252fce714053f0151680933571a2da9cbfb4
https://linux.oracle.com/cve/CVE-2015-8575.html
https://linux.oracle.com/errata/ELSA-2018-4172.html
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
https://ubuntu.com/security/notices/USN-2907-1
https://ubuntu.com/security/notices/USN-2907-2
https://ubuntu.com/security/notices/USN-2910-1
| +| kernel-headers | CVE-2015-8785 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ca8138f014a913f98e6ef40e939868e1e9ea876
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.openwall.com/lists/oss-security/2016/01/24/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/81688
http://www.ubuntu.com/usn/USN-2886-1
https://access.redhat.com/security/cve/CVE-2015-8785
https://bugzilla.redhat.com/show_bug.cgi?id=1290642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785
https://github.com/torvalds/linux/commit/3ca8138f014a913f98e6ef40e939868e1e9ea876
https://linux.oracle.com/cve/CVE-2015-8785.html
https://linux.oracle.com/errata/ELSA-2016-3596.html
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2907-1
https://ubuntu.com/security/notices/USN-2907-2
https://ubuntu.com/security/notices/USN-2908-1
https://ubuntu.com/security/notices/USN-2908-2
https://ubuntu.com/security/notices/USN-2908-3
https://ubuntu.com/security/notices/USN-2909-1
https://ubuntu.com/security/notices/USN-2910-1
| +| kernel-headers | CVE-2015-8816 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e50293ef9775c5f1cf3fcc093037dd6a8c5684ea
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://source.android.com/security/bulletin/2016-07-01.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.5
http://www.openwall.com/lists/oss-security/2016/02/23/5
http://www.openwall.com/lists/oss-security/2016/02/24/3
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/83363
http://www.spinics.net/lists/linux-usb/msg132311.html
https://access.redhat.com/security/cve/CVE-2015-8816
https://bugzilla.redhat.com/show_bug.cgi?id=1311589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816
https://github.com/torvalds/linux/commit/e50293ef9775c5f1cf3fcc093037dd6a8c5684ea
https://linux.oracle.com/cve/CVE-2015-8816.html
https://linux.oracle.com/errata/ELSA-2016-3596.html
| +| kernel-headers | CVE-2015-8964 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc
http://source.android.com/security/bulletin/2016-11-01.html
http://www.securityfocus.com/bid/94138
https://access.redhat.com/security/cve/CVE-2015-8964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8964
https://github.com/torvalds/linux/commit/dd42bf1197144ede075a9d4793123f7689e164bc
https://ubuntu.com/security/notices/USN-3161-1
https://ubuntu.com/security/notices/USN-3161-2
https://ubuntu.com/security/notices/USN-3161-3
https://ubuntu.com/security/notices/USN-3161-4
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
| +| kernel-headers | CVE-2016-0823 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce
http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
http://source.android.com/security/bulletin/2016-03-01.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.3
http://www.securityfocus.com/bid/84265
https://access.redhat.com/security/cve/CVE-2016-0823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0823
https://github.com/torvalds/linux/commit/ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce
https://googleprojectzero.blogspot.cz/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
| +| kernel-headers | CVE-2016-2184 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f886ca12765d20124bd06291c82951fd49a33be
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/102
http://seclists.org/bugtraq/2016/Mar/88
http://seclists.org/bugtraq/2016/Mar/89
http://www.debian.org/security/2016/dsa-3607
http://www.securityfocus.com/bid/84340
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-2184
https://bugzilla.redhat.com/show_bug.cgi?id=1317012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184
https://github.com/torvalds/linux/commit/0f886ca12765d20124bd06291c82951fd49a33be
https://source.android.com/security/bulletin/2016-11-01.html
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://www.exploit-db.com/exploits/39555/
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
| +| kernel-headers | CVE-2016-2185 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/116
http://seclists.org/bugtraq/2016/Mar/90
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.securityfocus.com/bid/84341
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-2185
https://bugzilla.redhat.com/show_bug.cgi?id=1283362
https://bugzilla.redhat.com/show_bug.cgi?id=1283363
https://bugzilla.redhat.com/show_bug.cgi?id=1317014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185
https://github.com/torvalds/linux/commit/950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
| +| kernel-headers | CVE-2016-2186 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9c6ba456711687b794dcf285856fc14e2c76074f
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://marc.info/?l=linux-usb&m=145796479528669&w=2
http://seclists.org/bugtraq/2016/Mar/117
http://seclists.org/bugtraq/2016/Mar/85
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.securityfocus.com/bid/84337
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-2186
https://bugzilla.redhat.com/show_bug.cgi?id=1317015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186
https://github.com/torvalds/linux/commit/9c6ba456711687b794dcf285856fc14e2c76074f
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
| +| kernel-headers | CVE-2016-2187 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=162f98dea487206d9ab79fc12ed64700667a894d
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://www.debian.org/security/2016/dsa-3607
http://www.securityfocus.com/bid/85425
http://www.ubuntu.com/usn/USN-2989-1
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-2998-1
http://www.ubuntu.com/usn/USN-3000-1
http://www.ubuntu.com/usn/USN-3001-1
http://www.ubuntu.com/usn/USN-3002-1
http://www.ubuntu.com/usn/USN-3003-1
http://www.ubuntu.com/usn/USN-3004-1
http://www.ubuntu.com/usn/USN-3005-1
http://www.ubuntu.com/usn/USN-3006-1
http://www.ubuntu.com/usn/USN-3007-1
https://access.redhat.com/security/cve/CVE-2016-2187
https://bugzilla.redhat.com/show_bug.cgi?id=1317017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2187
https://github.com/torvalds/linux/commit/162f98dea487206d9ab79fc12ed64700667a894d
https://ubuntu.com/security/notices/USN-2989-1
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-2998-1
https://ubuntu.com/security/notices/USN-3000-1
https://ubuntu.com/security/notices/USN-3001-1
https://ubuntu.com/security/notices/USN-3002-1
https://ubuntu.com/security/notices/USN-3003-1
https://ubuntu.com/security/notices/USN-3004-1
https://ubuntu.com/security/notices/USN-3005-1
https://ubuntu.com/security/notices/USN-3006-1
https://ubuntu.com/security/notices/USN-3007-1
| +| kernel-headers | CVE-2016-2188 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4ec0ef3a82125efc36173062a50624550a900ae0
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://marc.info/?l=linux-usb&m=145796659429788&w=2
http://seclists.org/bugtraq/2016/Mar/118
http://seclists.org/bugtraq/2016/Mar/87
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-2188
https://bugzilla.redhat.com/show_bug.cgi?id=1317018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2188
https://github.com/torvalds/linux/commit/4ec0ef3a82125efc36173062a50624550a900ae0
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://www.exploit-db.com/exploits/39556/
| +| kernel-headers | CVE-2016-2543 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=030e2c78d3a91dd0d27fef37e91950dde333eba1
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83377
http://www.securitytracker.com/id/1035304
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2543
https://bugzilla.redhat.com/show_bug.cgi?id=1311554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543
https://github.com/torvalds/linux/commit/030e2c78d3a91dd0d27fef37e91950dde333eba1
https://linux.oracle.com/cve/CVE-2016-2543.html
https://linux.oracle.com/errata/ELSA-2018-4145.html
https://lkml.org/lkml/2016/1/12/215
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
| +| kernel-headers | CVE-2016-2544 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3567eb6af614dac436c4b16a8d426f9faed639b3
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83380
http://www.securitytracker.com/id/1035305
http://www.spinics.net/lists/alsa-devel/msg45102.html
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2544
https://bugzilla.redhat.com/show_bug.cgi?id=1311558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544
https://github.com/torvalds/linux/commit/3567eb6af614dac436c4b16a8d426f9faed639b3
https://linux.oracle.com/cve/CVE-2016-2544.html
https://linux.oracle.com/errata/ELSA-2018-4145.html
https://lkml.org/lkml/2016/1/12/465
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
| +| kernel-headers | CVE-2016-2545 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee8413b01045c74340aa13ad5bdf905de32be736
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83381
http://www.securitytracker.com/id/1035296
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2545
https://bugzilla.redhat.com/show_bug.cgi?id=1311560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545
https://github.com/torvalds/linux/commit/ee8413b01045c74340aa13ad5bdf905de32be736
https://linux.oracle.com/cve/CVE-2016-2545.html
https://linux.oracle.com/errata/ELSA-2018-4145.html
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
| +| kernel-headers | CVE-2016-2549 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2ba1fe7a06d3624f9a7586d672b55f08f7c670f3
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83382
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2549
https://bugzilla.redhat.com/show_bug.cgi?id=1311570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549
https://github.com/torvalds/linux/commit/2ba1fe7a06d3624f9a7586d672b55f08f7c670f3
https://linux.oracle.com/cve/CVE-2016-2549.html
https://linux.oracle.com/errata/ELSA-2018-4145.html
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
| +| kernel-headers | CVE-2016-2782 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cac9b50b0d75a1d50d6c056ff65c005f3224c8e0
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.openwall.com/lists/oss-security/2016/02/28/9
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2782
https://bugzilla.redhat.com/show_bug.cgi?id=1312670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2782
https://github.com/torvalds/linux/commit/cac9b50b0d75a1d50d6c056ff65c005f3224c8e0
https://linux.oracle.com/cve/CVE-2016-2782.html
https://linux.oracle.com/errata/ELSA-2017-3567.html
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://www.exploit-db.com/exploits/39539/
| +| kernel-headers | CVE-2016-3136 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4e9a0b05257f29cf4b75f3209243ed71614d062e
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://seclists.org/bugtraq/2016/Mar/57
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/14/2
http://www.securityfocus.com/bid/84299
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-3000-1
https://access.redhat.com/security/cve/CVE-2016-3136
https://bugzilla.redhat.com/show_bug.cgi?id=1283370
https://bugzilla.redhat.com/show_bug.cgi?id=1317007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136
https://github.com/torvalds/linux/commit/4e9a0b05257f29cf4b75f3209243ed71614d062e
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-3000-1
https://www.exploit-db.com/exploits/39541/
| +| kernel-headers | CVE-2016-3137 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/55
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/14/3
http://www.securityfocus.com/bid/84300
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-3000-1
https://access.redhat.com/security/cve/CVE-2016-3137
https://bugzilla.redhat.com/show_bug.cgi?id=1283368
https://bugzilla.redhat.com/show_bug.cgi?id=1316996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137
https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-3000-1
| +| kernel-headers | CVE-2016-3138 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8835ba4a39cf53f705417b3b3a94eb067673f2c9
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/54
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/14/4
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-3138
https://bugzilla.redhat.com/show_bug.cgi?id=1283366
https://bugzilla.redhat.com/show_bug.cgi?id=1316204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138
https://github.com/torvalds/linux/commit/8835ba4a39cf53f705417b3b3a94eb067673f2c9
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
| +| kernel-headers | CVE-2016-3139 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=471d17148c8b4174ac5f5283a73316d12c4379bc
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
https://access.redhat.com/security/cve/CVE-2016-3139
https://bugzilla.redhat.com/show_bug.cgi?id=1283375
https://bugzilla.redhat.com/show_bug.cgi?id=1283377
https://bugzilla.redhat.com/show_bug.cgi?id=1316993
https://github.com/torvalds/linux/commit/471d17148c8b4174ac5f5283a73316d12c4379bc
https://linux.oracle.com/cve/CVE-2016-3139.html
https://linux.oracle.com/errata/ELSA-2019-4644.html
https://security-tracker.debian.org/tracker/CVE-2016-3139
https://www.exploit-db.com/exploits/39538/
| +| kernel-headers | CVE-2016-3140 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/61
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/14/6
http://www.securityfocus.com/bid/84304
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-3000-1
https://access.redhat.com/security/cve/CVE-2016-3140
https://bugzilla.redhat.com/show_bug.cgi?id=1283378
https://bugzilla.redhat.com/show_bug.cgi?id=1316995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140
https://github.com/torvalds/linux/commit/5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f
https://linux.oracle.com/cve/CVE-2016-3140.html
https://linux.oracle.com/errata/ELSA-2017-3535.html
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-3000-1
https://www.exploit-db.com/exploits/39537/
| +| kernel-headers | CVE-2016-3689 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/30/6
http://www.securitytracker.com/id/1035441
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-3000-1
https://access.redhat.com/security/cve/CVE-2016-3689
https://bugzilla.novell.com/show_bug.cgi?id=971628
https://bugzilla.redhat.com/show_bug.cgi?id=1320060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3689
https://github.com/torvalds/linux/commit/a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-3000-1
| +| kernel-headers | CVE-2016-3695 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/102327
https://access.redhat.com/security/cve/CVE-2016-3695
https://bugzilla.redhat.com/show_bug.cgi?id=1322755
https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
| +| kernel-headers | CVE-2016-3951 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1666984c8625b3db19a9abc298931d35ab7bc64b
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4d06dd537f95683aba3651098ae288b7cbff8274
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://seclists.org/oss-sec/2016/q2/19
http://www.debian.org/security/2016/dsa-3607
http://www.openwall.com/lists/oss-security/2016/04/06/4
http://www.securityfocus.com/bid/91028
http://www.securitytracker.com/id/1036763
http://www.ubuntu.com/usn/USN-2989-1
http://www.ubuntu.com/usn/USN-2998-1
http://www.ubuntu.com/usn/USN-3000-1
http://www.ubuntu.com/usn/USN-3001-1
http://www.ubuntu.com/usn/USN-3002-1
http://www.ubuntu.com/usn/USN-3003-1
http://www.ubuntu.com/usn/USN-3004-1
http://www.ubuntu.com/usn/USN-3021-1
http://www.ubuntu.com/usn/USN-3021-2
https://access.redhat.com/security/cve/CVE-2016-3951
https://bugzilla.novell.com/show_bug.cgi?id=974418
https://bugzilla.redhat.com/show_bug.cgi?id=1324782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1666984c8625b3db19a9abc298931d35ab7bc64b
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4d06dd537f95683aba3651098ae288b7cbff8274
https://github.com/torvalds/linux/commit/1666984c8625b3db19a9abc298931d35ab7bc64b
https://github.com/torvalds/linux/commit/4d06dd537f95683aba3651098ae288b7cbff8274
https://linux.oracle.com/cve/CVE-2016-3951.html
https://linux.oracle.com/errata/ELSA-2017-3533.html
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2989-1
https://ubuntu.com/security/notices/USN-2998-1
https://ubuntu.com/security/notices/USN-3000-1
https://ubuntu.com/security/notices/USN-3001-1
https://ubuntu.com/security/notices/USN-3002-1
https://ubuntu.com/security/notices/USN-3003-1
https://ubuntu.com/security/notices/USN-3004-1
https://ubuntu.com/security/notices/USN-3021-1
https://ubuntu.com/security/notices/USN-3021-2
https://www.spinics.net/lists/netdev/msg367669.html
| +| kernel-headers | CVE-2016-4482 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=681fef8380eb818c0b845fca5d2ab1dcbab114ee
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184414.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
http://www.debian.org/security/2016/dsa-3607
http://www.openwall.com/lists/oss-security/2016/05/04/2
http://www.openwall.com/lists/oss-security/2016/05/04/6
http://www.securityfocus.com/bid/90029
http://www.spinics.net/lists/linux-usb/msg140243.html
http://www.ubuntu.com/usn/USN-3016-1
http://www.ubuntu.com/usn/USN-3016-2
http://www.ubuntu.com/usn/USN-3016-3
http://www.ubuntu.com/usn/USN-3016-4
http://www.ubuntu.com/usn/USN-3017-1
http://www.ubuntu.com/usn/USN-3017-2
http://www.ubuntu.com/usn/USN-3017-3
http://www.ubuntu.com/usn/USN-3018-1
http://www.ubuntu.com/usn/USN-3018-2
http://www.ubuntu.com/usn/USN-3019-1
http://www.ubuntu.com/usn/USN-3020-1
http://www.ubuntu.com/usn/USN-3021-1
http://www.ubuntu.com/usn/USN-3021-2
https://access.redhat.com/security/cve/CVE-2016-4482
https://bugzilla.redhat.com/show_bug.cgi?id=1332931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482
https://git.kernel.org/cgit/linux/kernel/git/gregkh/usb.git/commit/?h=usb-next&id=681fef8380eb818c0b845fca5d2ab1dcbab114ee
https://github.com/torvalds/linux/commit/681fef8380eb818c0b845fca5d2ab1dcbab114ee
https://linux.oracle.com/cve/CVE-2016-4482.html
https://linux.oracle.com/errata/ELSA-2017-3516.html
https://ubuntu.com/security/notices/USN-3016-1
https://ubuntu.com/security/notices/USN-3016-2
https://ubuntu.com/security/notices/USN-3016-3
https://ubuntu.com/security/notices/USN-3016-4
https://ubuntu.com/security/notices/USN-3017-1
https://ubuntu.com/security/notices/USN-3017-2
https://ubuntu.com/security/notices/USN-3017-3
https://ubuntu.com/security/notices/USN-3018-1
https://ubuntu.com/security/notices/USN-3018-2
https://ubuntu.com/security/notices/USN-3019-1
https://ubuntu.com/security/notices/USN-3020-1
https://ubuntu.com/security/notices/USN-3021-1
https://ubuntu.com/security/notices/USN-3021-2
| +| kernel-headers | CVE-2016-4486 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5
http://www.openwall.com/lists/oss-security/2016/05/04/27
http://www.openwall.com/lists/oss-security/2016/05/05/2
http://www.securityfocus.com/bid/90051
http://www.ubuntu.com/usn/USN-2989-1
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-2998-1
http://www.ubuntu.com/usn/USN-3000-1
http://www.ubuntu.com/usn/USN-3001-1
http://www.ubuntu.com/usn/USN-3002-1
http://www.ubuntu.com/usn/USN-3003-1
http://www.ubuntu.com/usn/USN-3004-1
http://www.ubuntu.com/usn/USN-3005-1
http://www.ubuntu.com/usn/USN-3006-1
http://www.ubuntu.com/usn/USN-3007-1
https://access.redhat.com/security/cve/CVE-2016-4486
https://bugzilla.redhat.com/show_bug.cgi?id=1333316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486
https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6
https://github.com/torvalds/linux/commit/5f8e44741f9f216e33736ea4ec65ca9ac03036e6
https://ubuntu.com/security/notices/USN-2989-1
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-2998-1
https://ubuntu.com/security/notices/USN-3000-1
https://ubuntu.com/security/notices/USN-3001-1
https://ubuntu.com/security/notices/USN-3002-1
https://ubuntu.com/security/notices/USN-3003-1
https://ubuntu.com/security/notices/USN-3004-1
https://ubuntu.com/security/notices/USN-3005-1
https://ubuntu.com/security/notices/USN-3006-1
https://ubuntu.com/security/notices/USN-3007-1
https://www.exploit-db.com/exploits/46006/
| +| kernel-headers | CVE-2016-4580 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79e48650320e6fba48369fccf13fd045315b19b8
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5
http://www.openwall.com/lists/oss-security/2016/05/10/12
http://www.securityfocus.com/bid/90528
http://www.ubuntu.com/usn/USN-3016-1
http://www.ubuntu.com/usn/USN-3016-2
http://www.ubuntu.com/usn/USN-3016-3
http://www.ubuntu.com/usn/USN-3016-4
http://www.ubuntu.com/usn/USN-3017-1
http://www.ubuntu.com/usn/USN-3017-2
http://www.ubuntu.com/usn/USN-3017-3
http://www.ubuntu.com/usn/USN-3018-1
http://www.ubuntu.com/usn/USN-3018-2
http://www.ubuntu.com/usn/USN-3019-1
http://www.ubuntu.com/usn/USN-3020-1
http://www.ubuntu.com/usn/USN-3021-1
http://www.ubuntu.com/usn/USN-3021-2
https://access.redhat.com/security/cve/CVE-2016-4580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580
https://github.com/torvalds/linux/commit/79e48650320e6fba48369fccf13fd045315b19b8
https://linux.oracle.com/cve/CVE-2016-4580.html
https://linux.oracle.com/errata/ELSA-2017-3535.html
https://ubuntu.com/security/notices/USN-3016-1
https://ubuntu.com/security/notices/USN-3016-2
https://ubuntu.com/security/notices/USN-3016-3
https://ubuntu.com/security/notices/USN-3016-4
https://ubuntu.com/security/notices/USN-3017-1
https://ubuntu.com/security/notices/USN-3017-2
https://ubuntu.com/security/notices/USN-3017-3
https://ubuntu.com/security/notices/USN-3018-1
https://ubuntu.com/security/notices/USN-3018-2
https://ubuntu.com/security/notices/USN-3019-1
https://ubuntu.com/security/notices/USN-3020-1
https://ubuntu.com/security/notices/USN-3021-1
https://ubuntu.com/security/notices/USN-3021-2
| +| kernel-headers | CVE-2016-4805 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
http://seclists.org/oss-sec/2016/q2/346
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2
http://www.openwall.com/lists/oss-security/2016/05/15/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/90605
http://www.securitytracker.com/id/1036763
http://www.ubuntu.com/usn/USN-3021-1
http://www.ubuntu.com/usn/USN-3021-2
https://access.redhat.com/security/cve/CVE-2016-4805
https://bugzilla.redhat.com/show_bug.cgi?id=1335803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805
https://github.com/torvalds/linux/commit/1f461dcdd296eecedaffffc6bae2bfa90bd7eb89
https://linux.oracle.com/cve/CVE-2016-4805.html
https://linux.oracle.com/errata/ELSA-2016-3596.html
https://ubuntu.com/security/notices/USN-3021-1
https://ubuntu.com/security/notices/USN-3021-2
| +| kernel-headers | CVE-2016-6130 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6
http://www.debian.org/security/2016/dsa-3616
http://www.securityfocus.com/archive/1/538803/30/0/threaded
http://www.securityfocus.com/bid/91540
https://access.redhat.com/security/cve/CVE-2016-6130
https://bugzilla.kernel.org/show_bug.cgi?id=116741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6130
https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6
https://ubuntu.com/security/notices/USN-3099-1
| +| kernel-headers | CVE-2016-7425 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7bc2b55a5c030685b399bb65b6baa9ccc3d1f167
http://marc.info/?l=linux-scsi&m=147394713328707&w=2
http://marc.info/?l=linux-scsi&m=147394796228991&w=2
http://www.openwall.com/lists/oss-security/2016/09/17/2
http://www.securityfocus.com/bid/93037
http://www.ubuntu.com/usn/USN-3144-1
http://www.ubuntu.com/usn/USN-3144-2
http://www.ubuntu.com/usn/USN-3145-1
http://www.ubuntu.com/usn/USN-3145-2
http://www.ubuntu.com/usn/USN-3146-1
http://www.ubuntu.com/usn/USN-3146-2
http://www.ubuntu.com/usn/USN-3147-1
https://access.redhat.com/security/cve/CVE-2016-7425
https://bugzilla.redhat.com/show_bug.cgi?id=1377330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425
https://github.com/torvalds/linux/commit/7bc2b55a5c030685b399bb65b6baa9ccc3d1f167
https://linux.oracle.com/cve/CVE-2016-7425.html
https://linux.oracle.com/errata/ELSA-2017-3535.html
https://security-tracker.debian.org/tracker/CVE-2016-7425
https://ubuntu.com/security/notices/USN-3144-1
https://ubuntu.com/security/notices/USN-3144-2
https://ubuntu.com/security/notices/USN-3145-1
https://ubuntu.com/security/notices/USN-3145-2
https://ubuntu.com/security/notices/USN-3146-1
https://ubuntu.com/security/notices/USN-3146-2
https://ubuntu.com/security/notices/USN-3147-1
https://ubuntu.com/security/notices/USN-3161-3
https://ubuntu.com/security/notices/USN-3161-4
https://ubuntu.com/security/notices/USN-3162-2
| +| kernel-headers | CVE-2016-7916 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8148a73c9901a8794a50f950083c00ccf97d43b3
http://source.android.com/security/bulletin/2016-11-01.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.4
http://www.securityfocus.com/bid/94138
http://www.ubuntu.com/usn/USN-3159-1
http://www.ubuntu.com/usn/USN-3159-2
https://access.redhat.com/security/cve/CVE-2016-7916
https://bugzilla.kernel.org/show_bug.cgi?id=116461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7916
https://forums.grsecurity.net/viewtopic.php?f=3&t=4363
https://github.com/torvalds/linux/commit/8148a73c9901a8794a50f950083c00ccf97d43b3
https://ubuntu.com/security/notices/USN-3159-1
https://ubuntu.com/security/notices/USN-3159-2
https://ubuntu.com/security/notices/USN-3160-1
https://ubuntu.com/security/notices/USN-3160-2
| +| kernel-headers | CVE-2016-8405 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.debian.org/security/2017/dsa-3791
http://www.securityfocus.com/bid/94686
https://access.redhat.com/security/cve/CVE-2016-8405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405
https://marc.info/?l=linux-kernel&m=148365805203921&w=2
https://source.android.com/security/bulletin/2016-12-01.html
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3381-1
https://ubuntu.com/security/notices/USN-3381-2
| +| kernel-headers | CVE-2016-8658 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ded89912156b1a47d940a0c954c43afbabd0c42c
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.5
http://www.openwall.com/lists/oss-security/2016/10/13/1
http://www.securityfocus.com/bid/93541
http://www.ubuntu.com/usn/USN-3145-1
http://www.ubuntu.com/usn/USN-3145-2
http://www.ubuntu.com/usn/USN-3146-1
http://www.ubuntu.com/usn/USN-3146-2
https://access.redhat.com/security/cve/CVE-2016-8658
https://bugzilla.redhat.com/show_bug.cgi?id=1384403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8658
https://github.com/torvalds/linux/commit/ded89912156b1a47d940a0c954c43afbabd0c42c
https://ubuntu.com/security/notices/USN-3145-1
https://ubuntu.com/security/notices/USN-3145-2
https://ubuntu.com/security/notices/USN-3146-1
https://ubuntu.com/security/notices/USN-3146-2
https://ubuntu.com/security/notices/USN-3161-3
https://ubuntu.com/security/notices/USN-3161-4
| +| kernel-headers | CVE-2016-9178 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1c109fabbd51863475cd12ac206bdd249aee35af
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.5
http://www.openwall.com/lists/oss-security/2016/11/03/2
http://www.openwall.com/lists/oss-security/2016/11/04/4
http://www.securityfocus.com/bid/94144
https://access.redhat.com/security/cve/CVE-2016-9178
https://bugzilla.redhat.com/show_bug.cgi?id=1391908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9178
https://github.com/torvalds/linux/commit/1c109fabbd51863475cd12ac206bdd249aee35af
https://linux.oracle.com/cve/CVE-2016-9178.html
https://linux.oracle.com/errata/ELSA-2017-3534.html
https://ubuntu.com/security/notices/USN-3161-3
https://ubuntu.com/security/notices/USN-3422-1
https://ubuntu.com/security/notices/USN-3422-2
| +| kernel-headers | CVE-2016-9756 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2117d5398c81554fbf803f5fd1dc55eb78216c0c
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00000.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.12
http://www.openwall.com/lists/oss-security/2016/12/01/1
http://www.securityfocus.com/bid/94615
https://access.redhat.com/security/cve/CVE-2016-9756
https://bugzilla.redhat.com/show_bug.cgi?id=1400468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9756
https://github.com/torvalds/linux/commit/2117d5398c81554fbf803f5fd1dc55eb78216c0c
https://linux.oracle.com/cve/CVE-2016-9756.html
https://linux.oracle.com/errata/ELSA-2017-3533.html
https://ubuntu.com/security/notices/USN-3167-1
https://ubuntu.com/security/notices/USN-3167-2
https://ubuntu.com/security/notices/USN-3168-1
https://ubuntu.com/security/notices/USN-3168-2
https://ubuntu.com/security/notices/USN-3169-1
https://ubuntu.com/security/notices/USN-3169-2
https://ubuntu.com/security/notices/USN-3170-1
| +| kernel-headers | CVE-2017-0627 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/98205
https://access.redhat.com/security/cve/CVE-2017-0627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0627
https://github.com/LineageOS/android_kernel_lge_g3/commit/f85c1738998cdbd67e158e1f3b2af8f7c62a269e
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-uvc-driver
https://ubuntu.com/security/notices/USN-3674-1
https://ubuntu.com/security/notices/USN-3674-2
https://usn.ubuntu.com/3674-1/
https://usn.ubuntu.com/3674-2/
| +| kernel-headers | CVE-2017-0630 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/98213
https://access.redhat.com/security/cve/CVE-2017-0630
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
| +| kernel-headers | CVE-2017-1000365 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.securityfocus.com/bid/99156
https://access.redhat.com/security/cve/CVE-2017-1000365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365
https://linux.oracle.com/cve/CVE-2017-1000365.html
https://linux.oracle.com/errata/ELSA-2017-3622.html
https://patchwork.kernel.org/patch/9803203/
https://ubuntu.com/security/notices/USN-3377-1
https://ubuntu.com/security/notices/USN-3377-2
https://ubuntu.com/security/notices/USN-3378-1
https://ubuntu.com/security/notices/USN-3378-2
https://ubuntu.com/security/notices/USN-3381-1
https://ubuntu.com/security/notices/USN-3381-2
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
| +| kernel-headers | CVE-2017-1000371 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/99131
https://access.redhat.com/security/cve/CVE-2017-1000371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371
https://linux.oracle.com/cve/CVE-2017-1000371.html
https://linux.oracle.com/errata/ELSA-2020-1524.html
https://www.exploit-db.com/exploits/42273/
https://www.exploit-db.com/exploits/42276/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
| +| kernel-headers | CVE-2017-10810 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=385aee965b4e4c36551c362a334378d2985b722a
http://www.debian.org/security/2017/dsa-3927
http://www.securityfocus.com/bid/99433
https://access.redhat.com/security/cve/CVE-2017-10810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10810
https://github.com/torvalds/linux/commit/385aee965b4e4c36551c362a334378d2985b722a
https://lkml.org/lkml/2017/4/6/668
https://ubuntu.com/security/notices/USN-3377-1
https://ubuntu.com/security/notices/USN-3377-2
https://ubuntu.com/security/notices/USN-3378-1
https://ubuntu.com/security/notices/USN-3378-2
| +| kernel-headers | CVE-2017-11473 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...http://www.securityfocus.com/bid/100010
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/security/cve/CVE-2017-11473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11473
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=70ac67826602edf8c0ccb413e5ba7eacf597a60c
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=96301209473afd3f2f274b91cb7082d161b9be65
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=dad5ab0db8deac535d03e3fe3d8f2892173fa6a4
https://linux.oracle.com/cve/CVE-2017-11473.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://source.android.com/security/bulletin/pixel/2018-01-01
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-12153 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://seclists.org/oss-sec/2017/q3/437
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100855
https://access.redhat.com/security/cve/CVE-2017-12153
https://bugzilla.novell.com/show_bug.cgi?id=1058410
https://bugzilla.redhat.com/show_bug.cgi?id=1491046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153
https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888
https://linux.oracle.com/cve/CVE-2017-12153.html
https://linux.oracle.com/errata/ELSA-2019-4531.html
https://marc.info/?l=linux-wireless&m=150525493517953&w=2
https://marc.info/?t=150525503100001&r=1&w=2
https://ubuntu.com/security/notices/USN-3469-1
https://ubuntu.com/security/notices/USN-3469-2
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
| +| kernel-headers | CVE-2017-12762 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://seclists.org/oss-sec/2017/q3/274
http://www.openwall.com/lists/oss-security/2020/02/11/1
http://www.openwall.com/lists/oss-security/2020/02/11/2
http://www.openwall.com/lists/oss-security/2020/02/14/4
http://www.securityfocus.com/bid/100251
https://access.redhat.com/security/cve/CVE-2017-12762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12762
https://patchwork.kernel.org/patch/9880041/
https://ubuntu.com/security/notices/USN-3420-1
https://ubuntu.com/security/notices/USN-3420-2
https://ubuntu.com/security/notices/USN-3620-1
https://ubuntu.com/security/notices/USN-3620-2
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
| +| kernel-headers | CVE-2017-14140 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=197e7e521384a23b9e585178f3f11c9fa08274b9
http://www.debian.org/security/2017/dsa-3981
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.9
http://www.securityfocus.com/bid/100876
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/security/cve/CVE-2017-14140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140
https://github.com/torvalds/linux/commit/197e7e521384a23b9e585178f3f11c9fa08274b9
https://linux.oracle.com/cve/CVE-2017-14140.html
https://linux.oracle.com/errata/ELSA-2018-4025.html
https://source.android.com/security/bulletin/pixel/2018-01-01
https://ubuntu.com/security/notices/USN-3444-1
https://ubuntu.com/security/notices/USN-3444-2
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
| +| kernel-headers | CVE-2017-15115 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://seclists.org/oss-sec/2017/q4/282
http://www.securityfocus.com/bid/101877
https://access.redhat.com/security/cve/CVE-2017-15115
https://bugzilla.redhat.com/show_bug.cgi?id=1513345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15115
https://git.kernel.org/linus/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
https://github.com/torvalds/linux/commit/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
https://linux.oracle.com/cve/CVE-2017-15115.html
https://linux.oracle.com/errata/ELSA-2018-4025.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://patchwork.ozlabs.org/patch/827077/
https://source.android.com/security/bulletin/pixel/2018-04-01
https://ubuntu.com/security/notices/USN-3581-1
https://ubuntu.com/security/notices/USN-3581-2
https://ubuntu.com/security/notices/USN-3581-3
https://ubuntu.com/security/notices/USN-3582-1
https://ubuntu.com/security/notices/USN-3582-2
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3581-1/
https://usn.ubuntu.com/3581-2/
https://usn.ubuntu.com/3581-3/
https://usn.ubuntu.com/3582-1/
https://usn.ubuntu.com/3582-2/
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
| +| kernel-headers | CVE-2017-16525 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/102028
https://access.redhat.com/security/cve/CVE-2017-16525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16525
https://github.com/torvalds/linux/commit/299d7572e46f98534033a9e65973f13ad1ce9047
https://github.com/torvalds/linux/commit/bd998c2e0df0469707503023d50d46cf0b10c787
https://groups.google.com/d/msg/syzkaller/cMACrmo1x0k/4KhRoUgABAAJ
https://linux.oracle.com/cve/CVE-2017-16525.html
https://linux.oracle.com/errata/ELSA-2018-4041.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
| +| kernel-headers | CVE-2017-16526 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
https://github.com/torvalds/linux/commit/bbf26183b7a6236ba602f4d6a2f7cade35bba043
https://groups.google.com/d/msg/syzkaller/zROBxKXzHDk/5I6aZ3O2AgAJ
https://linux.oracle.com/cve/CVE-2017-16526.html
https://linux.oracle.com/errata/ELSA-2018-4040.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2018/dsa-4187
| +| kernel-headers | CVE-2017-16527 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16527
https://github.com/torvalds/linux/commit/124751d5e63c823092060074bd0abaae61aaa9c4
https://groups.google.com/d/msg/syzkaller/jf7GTr_g2CU/iVlLhMciCQAJ
https://linux.oracle.com/cve/CVE-2017-16527.html
https://linux.oracle.com/errata/ELSA-2017-3651.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-16529 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/103284
https://access.redhat.com/security/cve/CVE-2017-16529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16529
https://github.com/torvalds/linux/commit/bfc81a8bc18e3c4ba0cbaa7666ff76be2f998991
https://groups.google.com/d/msg/syzkaller/rDzv5RP_f2M/M5au06qmAwAJ
https://linux.oracle.com/cve/CVE-2017-16529.html
https://linux.oracle.com/errata/ELSA-2018-4041.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-16530 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16530
https://github.com/torvalds/linux/commit/786de92b3cb26012d3d0f00ee37adf14527f35c4
https://groups.google.com/d/msg/syzkaller/pCswO77gRlM/VHuPOftgAwAJ
https://linux.oracle.com/cve/CVE-2017-16530.html
https://linux.oracle.com/errata/ELSA-2018-4001.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
| +| kernel-headers | CVE-2017-16531 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/102025
https://access.redhat.com/security/cve/CVE-2017-16531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16531
https://github.com/torvalds/linux/commit/bd7a3fe770ebd8391d1c7d072ff88e9e76d063eb
https://groups.google.com/d/msg/syzkaller/hP6L-m59m_8/Co2ouWeFAwAJ
https://linux.oracle.com/cve/CVE-2017-16531.html
https://linux.oracle.com/errata/ELSA-2018-4041.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| kernel-headers | CVE-2017-16532 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16532
https://github.com/torvalds/linux/commit/7c80f9e4a588f1925b07134bb2e3689335f6c6d8
https://groups.google.com/d/msg/syzkaller/l3870gs3LhA/y79DYQdFBAAJ
https://linux.oracle.com/cve/CVE-2017-16532.html
https://linux.oracle.com/errata/ELSA-2018-4110.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-16533 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/102026
https://access.redhat.com/security/cve/CVE-2017-16533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16533
https://github.com/torvalds/linux/commit/f043bfc98c193c284e2cd768fefabe18ac2fed9b
https://groups.google.com/d/msg/syzkaller/CxkJ9QZgwlM/O3IOvAaGAwAJ
https://linux.oracle.com/cve/CVE-2017-16533.html
https://linux.oracle.com/errata/ELSA-2018-4001.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-16534 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
https://access.redhat.com/security/cve/CVE-2017-16534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16534
https://github.com/torvalds/linux/commit/2e1c42391ff2556387b3cb6308b24f6f65619feb
https://groups.google.com/d/msg/syzkaller/nXnjqI73uPo/6sUyq6kqAgAJ
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
| +| kernel-headers | CVE-2017-16535 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/102022
https://access.redhat.com/security/cve/CVE-2017-16535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16535
https://github.com/torvalds/linux/commit/1c0edc3633b56000e18d82fc241e3995ca18a69e
https://groups.google.com/d/msg/syzkaller/tzdz2fTB1K0/OvjIgLSTAgAJ
https://linux.oracle.com/cve/CVE-2017-16535.html
https://linux.oracle.com/errata/ELSA-2018-4040.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3507-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-16536 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16536
https://groups.google.com/d/msg/syzkaller/WlUAVfDvpRk/1V1xuEA4AgAJ
https://linux.oracle.com/cve/CVE-2017-16536.html
https://linux.oracle.com/errata/ELSA-2018-4001.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://patchwork.kernel.org/patch/9963527/
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-16537 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16537
https://groups.google.com/d/msg/syzkaller/bBFN8imrjjo/-5jCl8EiCQAJ
https://linux.oracle.com/cve/CVE-2017-16537.html
https://linux.oracle.com/errata/ELSA-2018-4110.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://patchwork.kernel.org/patch/9994017/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-16538 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
https://access.redhat.com/security/cve/CVE-2017-16538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
https://git.linuxtv.org/media_tree.git/commit/?id=3d932ee27e852e4904647f15b64dedca51187ad7
https://git.linuxtv.org/media_tree.git/commit/?id=7bf7a7116ed313c601307f7e585419369926ab05
https://groups.google.com/d/msg/syzkaller/XwNidsl4X04/ti6I2IaRBAAJ
https://linux.oracle.com/cve/CVE-2017-16538.html
https://linux.oracle.com/errata/ELSA-2020-5750.html
https://patchwork.linuxtv.org/patch/44566/
https://patchwork.linuxtv.org/patch/44567/
https://ubuntu.com/security/notices/USN-3631-1
https://ubuntu.com/security/notices/USN-3631-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3631-1/
https://usn.ubuntu.com/3631-2/
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
| +| kernel-headers | CVE-2017-16643 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
http://www.securityfocus.com/bid/101769
https://access.redhat.com/security/cve/CVE-2017-16643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16643
https://github.com/torvalds/linux/commit/a50829479f58416a013a4ccca791336af3c584c7
https://groups.google.com/d/msg/syzkaller/McWFcOsA47Y/3bjtBBgaBAAJ
https://linux.oracle.com/cve/CVE-2017-16643.html
https://linux.oracle.com/errata/ELSA-2018-4110.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3507-1
https://ubuntu.com/security/notices/USN-3509-1
https://ubuntu.com/security/notices/USN-3509-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-16644 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/101842
https://access.redhat.com/security/cve/CVE-2017-16644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
https://git.linuxtv.org/media_tree.git/commit/?id=c0f71bbb810237a38734607ca4599632f7f5d47f
https://groups.google.com/d/msg/syzkaller/ngC5SLvxPm4/gduhCARhAwAJ
https://linux.oracle.com/cve/CVE-2017-16644.html
https://linux.oracle.com/errata/ELSA-2020-5837.html
https://patchwork.kernel.org/patch/9966135/
https://ubuntu.com/security/notices/USN-3754-1
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2017/dsa-4073
| +| kernel-headers | CVE-2017-16646 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/101846
https://access.redhat.com/security/cve/CVE-2017-16646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16646
https://groups.google.com/d/msg/syzkaller/-d6ilzbVu_g/OBy8_62mAwAJ
https://linux.oracle.com/cve/CVE-2017-16646.html
https://linux.oracle.com/errata/ELSA-2018-4071.html
https://patchwork.linuxtv.org/patch/45291/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
| +| kernel-headers | CVE-2017-16647 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/101767
https://access.redhat.com/security/cve/CVE-2017-16647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16647
https://groups.google.com/d/msg/syzkaller/_9a6pd-p_0E/OnmnplQuAgAJ
https://patchwork.ozlabs.org/patch/834686/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
| +| kernel-headers | CVE-2017-16649 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/101761
https://access.redhat.com/security/cve/CVE-2017-16649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16649
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=2cb80187ba065d7decad7c6614e35e07aec8a974
https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://patchwork.ozlabs.org/patch/834771/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3822-1
https://ubuntu.com/security/notices/USN-3822-2
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3822-1/
https://usn.ubuntu.com/3822-2/
| +| kernel-headers | CVE-2017-16650 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/101791
https://access.redhat.com/security/cve/CVE-2017-16650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16650
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=7fd078337201cf7468f53c3d9ef81ff78cb6df3b
https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ
https://linux.oracle.com/cve/CVE-2017-16650.html
https://linux.oracle.com/errata/ELSA-2019-4644.html
https://patchwork.ozlabs.org/patch/834770/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-17450 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://www.securityfocus.com/bid/102110
https://access.redhat.com/security/cve/CVE-2017-17450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
https://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf.git/commit/?id=916a27901de01446bcf57ecca4783f6cff493309
https://linux.oracle.com/cve/CVE-2017-17450.html
https://linux.oracle.com/errata/ELSA-2019-4317.html
https://lkml.org/lkml/2017/12/5/982
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3632-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
| +| kernel-headers | CVE-2017-17741 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/102227
https://access.redhat.com/security/cve/CVE-2017-17741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
https://linux.oracle.com/cve/CVE-2017-17741.html
https://linux.oracle.com/errata/ELSA-2018-4172.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3620-1
https://ubuntu.com/security/notices/USN-3620-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
https://usn.ubuntu.com/3632-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
https://www.spinics.net/lists/kvm/msg160710.html
https://www.spinics.net/lists/kvm/msg160796.html
| +| kernel-headers | CVE-2017-5549 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=146cc8a17a3b4996f6805ee5c080e7101277c410
http://seclists.org/oss-sec/2017/q1/161
http://www.debian.org/security/2017/dsa-3791
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5
http://www.openwall.com/lists/oss-security/2017/01/21/3
http://www.securityfocus.com/bid/95715
https://access.redhat.com/security/cve/CVE-2017-5549
https://bugzilla.redhat.com/show_bug.cgi?id=1416114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549
https://github.com/torvalds/linux/commit/146cc8a17a3b4996f6805ee5c080e7101277c410
https://ubuntu.com/security/notices/USN-3208-1
https://ubuntu.com/security/notices/USN-3208-2
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-5897 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.debian.org/security/2017/dsa-3791
http://www.openwall.com/lists/oss-security/2017/02/07/2
http://www.securityfocus.com/bid/96037
http://www.securitytracker.com/id/1037794
https://access.redhat.com/security/cve/CVE-2017-5897
https://bugzilla.redhat.com/show_bug.cgi?id=1419848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=7892032cfe67f4bde6fc2ee967e45a8fbaf33756
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=7892032cfe67f4bde6fc2ee967e45a8fbaf33756
https://linux.oracle.com/cve/CVE-2017-5897.html
https://linux.oracle.com/errata/ELSA-2017-3533.html
https://source.android.com/security/bulletin/2017-09-01
https://ubuntu.com/security/notices/USN-3265-1
https://ubuntu.com/security/notices/USN-3265-2
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-5967 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?id=dfb4357da6ddbdf57d583ba64361c9d792b0e0b1
http://www.securityfocus.com/bid/96271
https://access.redhat.com/security/cve/CVE-2017-5967
https://bugzilla.kernel.org/show_bug.cgi?id=193921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5967
https://ubuntu.com/security/notices/USN-4904-1
| +| kernel-headers | CVE-2017-7261 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://marc.info/?t=149037004200005&r=1&w=2
http://www.securityfocus.com/bid/97096
https://access.redhat.com/security/cve/CVE-2017-7261
https://bugzilla.redhat.com/show_bug.cgi?id=1435719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7261
https://linux.oracle.com/cve/CVE-2017-7261.html
https://linux.oracle.com/errata/ELSA-2020-5671.html
https://lists.freedesktop.org/archives/dri-devel/2017-March/136814.html
https://ubuntu.com/security/notices/USN-3291-1
https://ubuntu.com/security/notices/USN-3291-2
https://ubuntu.com/security/notices/USN-3291-3
https://ubuntu.com/security/notices/USN-3293-1
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3406-1
https://ubuntu.com/security/notices/USN-3406-2
| +| kernel-headers | CVE-2017-7273 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1ebb71143758f45dc0fa76e2f48429e13b16d110
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4faec4a2ef5dd481682cc155cb9ea14ba2534b76
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.4
http://www.securityfocus.com/bid/97190
https://access.redhat.com/security/cve/CVE-2017-7273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7273
https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110
https://linux.oracle.com/cve/CVE-2017-7273.html
https://linux.oracle.com/errata/ELSA-2017-3597.html
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3406-1
https://ubuntu.com/security/notices/USN-3406-2
| +| kernel-headers | CVE-2017-7346 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://marc.info/?l=linux-kernel&m=149086968410117&w=2
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.openwall.com/lists/oss-security/2017/03/29/1
http://www.securityfocus.com/bid/97257
https://access.redhat.com/security/cve/CVE-2017-7346
https://bugzilla.redhat.com/show_bug.cgi?id=1437431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346
https://github.com/torvalds/linux/commit/ee9c4e681ec4f58e42a83cb0c22a0289ade1aacf
https://linux.oracle.com/cve/CVE-2017-7346.html
https://linux.oracle.com/errata/ELSA-2020-5670.html
https://lists.freedesktop.org/archives/dri-devel/2017-March/137429.html
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
| +| kernel-headers | CVE-2017-8831 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/archive/1/540770/30/0/threaded
http://www.securityfocus.com/bid/99619
https://access.redhat.com/security/cve/CVE-2017-8831
https://bugzilla.kernel.org/show_bug.cgi?id=195559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831
https://github.com/stoth68000/media-tree/commit/354dd3924a2e43806774953de536257548b5002c
https://linux.oracle.com/cve/CVE-2017-8831.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3420-1
https://ubuntu.com/security/notices/USN-3420-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2017-8924 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=654b404f2a222f918af9b0cd18ad469d0c941a8e
http://www.debian.org/security/2017/dsa-3886
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.4
http://www.securityfocus.com/bid/98451
https://access.redhat.com/security/cve/CVE-2017-8924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924
https://github.com/torvalds/linux/commit/654b404f2a222f918af9b0cd18ad469d0c941a8e
https://linux.oracle.com/cve/CVE-2017-8924.html
https://linux.oracle.com/errata/ELSA-2020-5881.html
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3361-1
| +| kernel-headers | CVE-2017-8925 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30572418b445d85fcfe6c8fe84c947d2606767d8
http://www.debian.org/security/2017/dsa-3886
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.4
http://www.securityfocus.com/bid/98462
https://access.redhat.com/security/cve/CVE-2017-8925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925
https://github.com/torvalds/linux/commit/30572418b445d85fcfe6c8fe84c947d2606767d8
https://linux.oracle.com/cve/CVE-2017-8925.html
https://linux.oracle.com/errata/ELSA-2020-5936.html
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3361-1
| +| kernel-headers | CVE-2017-9605 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07678eca2cf9c9a18584e546c2b2a0d0c9a3150c
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.openwall.com/lists/oss-security/2017/06/13/2
http://www.securityfocus.com/bid/99095
https://access.redhat.com/security/cve/CVE-2017-9605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605
https://github.com/torvalds/linux/commit/07678eca2cf9c9a18584e546c2b2a0d0c9a3150c
https://linux.oracle.com/cve/CVE-2017-9605.html
https://linux.oracle.com/errata/ELSA-2020-5962.html
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
| +| kernel-headers | CVE-2018-1000204 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
http://www.openwall.com/lists/oss-security/2018/06/26/3
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2018-1000204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000204
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a45b599ad808c3c982fdcdc12b0b8611c2f92824
https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824
https://linux.oracle.com/cve/CVE-2018-1000204.html
https://linux.oracle.com/errata/ELSA-2019-4316.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://ubuntu.com/security/notices/USN-3696-1
https://ubuntu.com/security/notices/USN-3696-2
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3696-1/
https://usn.ubuntu.com/3696-2/
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2018-10322 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://www.securityfocus.com/bid/103960
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-10322
https://bugzilla.kernel.org/show_bug.cgi?id=199377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10322
https://linux.oracle.com/cve/CVE-2018-10322.html
https://linux.oracle.com/errata/ELSA-2019-4509.html
https://ubuntu.com/security/notices/USN-4578-1
https://ubuntu.com/security/notices/USN-4579-1
https://usn.ubuntu.com/4578-1/
https://usn.ubuntu.com/4579-1/
https://www.spinics.net/lists/linux-xfs/msg17215.html
| +| kernel-headers | CVE-2018-10876 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.6.1.el7a |
Expand...http://patchwork.ozlabs.org/patch/929239/
http://www.securityfocus.com/bid/104904
http://www.securityfocus.com/bid/106503
https://access.redhat.com/errata/RHSA-2019:0525
https://access.redhat.com/security/cve/CVE-2018-10876
https://bugzilla.kernel.org/show_bug.cgi?id=199403
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10876
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c
https://linux.oracle.com/cve/CVE-2018-10876.html
https://linux.oracle.com/errata/ELSA-2019-4577.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://ubuntu.com/security/notices/USN-3753-1
https://ubuntu.com/security/notices/USN-3753-2
https://ubuntu.com/security/notices/USN-3871-1
https://ubuntu.com/security/notices/USN-3871-3
https://ubuntu.com/security/notices/USN-3871-4
https://ubuntu.com/security/notices/USN-3871-5
https://usn.ubuntu.com/3753-1/
https://usn.ubuntu.com/3753-2/
https://usn.ubuntu.com/3871-1/
https://usn.ubuntu.com/3871-3/
https://usn.ubuntu.com/3871-4/
https://usn.ubuntu.com/3871-5/
| +| kernel-headers | CVE-2018-10877 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://patchwork.ozlabs.org/patch/929744/
http://www.securityfocus.com/bid/104878
http://www.securityfocus.com/bid/106503
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2018-10877
https://bugzilla.kernel.org/show_bug.cgi?id=199417
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10877
https://linux.oracle.com/cve/CVE-2018-10877.html
https://linux.oracle.com/errata/ELSA-2019-4601.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://ubuntu.com/security/notices/USN-3753-1
https://ubuntu.com/security/notices/USN-3753-2
https://ubuntu.com/security/notices/USN-3754-1
https://ubuntu.com/security/notices/USN-3871-1
https://ubuntu.com/security/notices/USN-3871-3
https://ubuntu.com/security/notices/USN-3871-4
https://ubuntu.com/security/notices/USN-3871-5
https://usn.ubuntu.com/3753-1/
https://usn.ubuntu.com/3753-2/
https://usn.ubuntu.com/3754-1/
https://usn.ubuntu.com/3871-1/
https://usn.ubuntu.com/3871-3/
https://usn.ubuntu.com/3871-4/
https://usn.ubuntu.com/3871-5/
| +| kernel-headers | CVE-2018-10879 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://patchwork.ozlabs.org/patch/928666/
http://patchwork.ozlabs.org/patch/928667/
http://www.securityfocus.com/bid/104902
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-10879
https://bugzilla.kernel.org/show_bug.cgi?id=200001
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10879
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d
https://linux.oracle.com/cve/CVE-2018-10879.html
https://linux.oracle.com/errata/ELSA-2019-4600.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://ubuntu.com/security/notices/USN-3753-1
https://ubuntu.com/security/notices/USN-3753-2
https://ubuntu.com/security/notices/USN-3871-1
https://ubuntu.com/security/notices/USN-3871-3
https://ubuntu.com/security/notices/USN-3871-4
https://ubuntu.com/security/notices/USN-3871-5
https://usn.ubuntu.com/3753-1/
https://usn.ubuntu.com/3753-2/
https://usn.ubuntu.com/3871-1/
https://usn.ubuntu.com/3871-3/
https://usn.ubuntu.com/3871-4/
https://usn.ubuntu.com/3871-5/
| +| kernel-headers | CVE-2018-10880 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://patchwork.ozlabs.org/patch/930639/
http://www.securityfocus.com/bid/104907
http://www.securityfocus.com/bid/106503
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2018-10880
https://bugzilla.kernel.org/show_bug.cgi?id=200005
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10880
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://ubuntu.com/security/notices/USN-3821-1
https://ubuntu.com/security/notices/USN-3821-2
https://ubuntu.com/security/notices/USN-3871-1
https://ubuntu.com/security/notices/USN-3871-3
https://ubuntu.com/security/notices/USN-3871-4
https://ubuntu.com/security/notices/USN-3871-5
https://usn.ubuntu.com/3821-1/
https://usn.ubuntu.com/3821-2/
https://usn.ubuntu.com/3871-1/
https://usn.ubuntu.com/3871-3/
https://usn.ubuntu.com/3871-4/
https://usn.ubuntu.com/3871-5/
| +| kernel-headers | CVE-2018-10881 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://patchwork.ozlabs.org/patch/929792/
http://www.securityfocus.com/bid/104901
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-10881
https://bugzilla.kernel.org/show_bug.cgi?id=200015
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10881
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e8ab72a812396996035a37e5ca4b3b99b5d214b
https://linux.oracle.com/cve/CVE-2018-10881.html
https://linux.oracle.com/errata/ELSA-2019-4600.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://ubuntu.com/security/notices/USN-3753-1
https://ubuntu.com/security/notices/USN-3753-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
https://usn.ubuntu.com/3753-1/
https://usn.ubuntu.com/3753-2/
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2018-10882 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://www.securityfocus.com/bid/106503
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2018-10882
https://bugzilla.kernel.org/show_bug.cgi?id=200069
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10882
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c37e9e013469521d9adb932d17a1795c139b36db
https://linux.oracle.com/cve/CVE-2018-10882.html
https://linux.oracle.com/errata/ELSA-2019-4601.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://ubuntu.com/security/notices/USN-3753-1
https://ubuntu.com/security/notices/USN-3753-2
https://ubuntu.com/security/notices/USN-3871-1
https://ubuntu.com/security/notices/USN-3871-3
https://ubuntu.com/security/notices/USN-3871-4
https://ubuntu.com/security/notices/USN-3871-5
https://usn.ubuntu.com/3753-1/
https://usn.ubuntu.com/3753-2/
https://usn.ubuntu.com/3871-1/
https://usn.ubuntu.com/3871-3/
https://usn.ubuntu.com/3871-4/
https://usn.ubuntu.com/3871-5/
| +| kernel-headers | CVE-2018-10883 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-10883
https://bugzilla.kernel.org/show_bug.cgi?id=200071
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10883
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8bc1379b82b8e809eef77a9fedbb75c6c297be19
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e09463f220ca9a1a1ecfda84fcda658f99a1f12a
https://linux.oracle.com/cve/CVE-2018-10883.html
https://linux.oracle.com/errata/ELSA-2018-3083.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://support.f5.com/csp/article/K94735334?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3871-1
https://ubuntu.com/security/notices/USN-3871-3
https://ubuntu.com/security/notices/USN-3871-4
https://ubuntu.com/security/notices/USN-3871-5
https://ubuntu.com/security/notices/USN-3879-1
https://ubuntu.com/security/notices/USN-3879-2
https://usn.ubuntu.com/3871-1/
https://usn.ubuntu.com/3871-3/
https://usn.ubuntu.com/3871-4/
https://usn.ubuntu.com/3871-5/
https://usn.ubuntu.com/3879-1/
https://usn.ubuntu.com/3879-2/
| +| kernel-headers | CVE-2018-1092 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://openwall.com/lists/oss-security/2018/03/29/1
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-1092
https://bugzilla.kernel.org/show_bug.cgi?id=199179
https://bugzilla.kernel.org/show_bug.cgi?id=199275
https://bugzilla.redhat.com/show_bug.cgi?id=1560777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=8e4b5eae5decd9dfe5a4ee369c22028f90ab4c44
https://linux.oracle.com/cve/CVE-2018-1092.html
https://linux.oracle.com/errata/ELSA-2019-4317.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://ubuntu.com/security/notices/USN-3676-1
https://ubuntu.com/security/notices/USN-3676-2
https://ubuntu.com/security/notices/USN-3677-1
https://ubuntu.com/security/notices/USN-3677-2
https://ubuntu.com/security/notices/USN-3678-1
https://ubuntu.com/security/notices/USN-3678-2
https://ubuntu.com/security/notices/USN-3678-3
https://ubuntu.com/security/notices/USN-3678-4
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3676-1/
https://usn.ubuntu.com/3676-2/
https://usn.ubuntu.com/3677-1/
https://usn.ubuntu.com/3677-2/
https://usn.ubuntu.com/3678-1/
https://usn.ubuntu.com/3678-2/
https://usn.ubuntu.com/3678-3/
https://usn.ubuntu.com/3678-4/
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2018/dsa-4187
https://www.debian.org/security/2018/dsa-4188
| +| kernel-headers | CVE-2018-1094 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://openwall.com/lists/oss-security/2018/03/29/1
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-1094
https://bugzilla.kernel.org/show_bug.cgi?id=199183
https://bugzilla.redhat.com/show_bug.cgi?id=1560788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1094
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=18db4b4e6fc31eda838dd1c1296d67dbcb3dc957
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=a45403b51582a87872927a3e0fc0a389c26867f1
https://linux.oracle.com/cve/CVE-2018-1094.html
https://linux.oracle.com/errata/ELSA-2019-4533.html
https://ubuntu.com/security/notices/USN-3695-1
https://ubuntu.com/security/notices/USN-3695-2
https://usn.ubuntu.com/3695-1/
https://usn.ubuntu.com/3695-2/
| +| kernel-headers | CVE-2018-10940 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
http://www.securityfocus.com/bid/104154
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-10940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10940
https://github.com/torvalds/linux/commit/9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
https://linux.oracle.com/cve/CVE-2018-10940.html
https://linux.oracle.com/errata/ELSA-2018-3083.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://ubuntu.com/security/notices/USN-3676-1
https://ubuntu.com/security/notices/USN-3676-2
https://ubuntu.com/security/notices/USN-3695-1
https://ubuntu.com/security/notices/USN-3695-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3676-1/
https://usn.ubuntu.com/3676-2/
https://usn.ubuntu.com/3695-1/
https://usn.ubuntu.com/3695-2/
https://usn.ubuntu.com/3754-1/
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.6
| +| kernel-headers | CVE-2018-1095 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://openwall.com/lists/oss-security/2018/03/29/1
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/security/cve/CVE-2018-1095
https://bugzilla.kernel.org/show_bug.cgi?id=199185
https://bugzilla.redhat.com/show_bug.cgi?id=1560793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1095
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=ce3fd194fcc6fbdc00ce095a852f22df97baa401
https://ubuntu.com/security/notices/USN-3695-1
https://ubuntu.com/security/notices/USN-3695-2
https://usn.ubuntu.com/3695-1/
https://usn.ubuntu.com/3695-2/
| +| kernel-headers | CVE-2018-1108 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/104055
https://access.redhat.com/security/cve/CVE-2018-1108
https://bugs.chromium.org/p/project-zero/issues/detail?id=1559
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1108
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43838a23a05fbd13e47d750d3dfd77001536dd33
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8ef35c866f8862df074a49a93b0309725812dea8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dc12baacb95f205948f64dc936a47d89ee110117
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://usn.ubuntu.com/3718-1/
https://usn.ubuntu.com/3718-2/
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
https://www.debian.org/security/2018/dsa-4188
| +| kernel-headers | CVE-2018-1118 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-1118
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1118
https://linux.oracle.com/cve/CVE-2018-1118.html
https://linux.oracle.com/errata/ELSA-2018-3083.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://lkml.org/lkml/2018/4/27/833
https://lkml.org/lkml/2018/5/29/1324
https://ubuntu.com/security/notices/USN-3762-1
https://ubuntu.com/security/notices/USN-3762-2
https://usn.ubuntu.com/3762-1/
https://usn.ubuntu.com/3762-2/
| +| kernel-headers | CVE-2018-13053 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.7.1.el7a |
Expand...http://www.securityfocus.com/bid/104671
https://access.redhat.com/errata/RHSA-2019:0831
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/security/cve/CVE-2018-13053
https://bugzilla.kernel.org/show_bug.cgi?id=200303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13053
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=5f936e19cc0ef97dbe3a56e9498922ad5ba1edef
https://linux.oracle.com/cve/CVE-2018-13053.html
https://linux.oracle.com/errata/ELSA-2019-4577.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://ubuntu.com/security/notices/USN-3821-1
https://ubuntu.com/security/notices/USN-3821-2
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/3821-1/
https://usn.ubuntu.com/3821-2/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4118-1/
| +| kernel-headers | CVE-2018-13094 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.7.1.el7a |
Expand...https://access.redhat.com/errata/RHSA-2019:0831
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/security/cve/CVE-2018-13094
https://bugzilla.kernel.org/show_bug.cgi?id=199969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13094
https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git/commit/?h=for-next&id=bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a
https://github.com/torvalds/linux/commit/bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a
https://linux.oracle.com/cve/CVE-2018-13094.html
https://linux.oracle.com/errata/ELSA-2019-2029.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://ubuntu.com/security/notices/USN-3753-1
https://ubuntu.com/security/notices/USN-3753-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
https://usn.ubuntu.com/3753-1/
https://usn.ubuntu.com/3753-2/
https://usn.ubuntu.com/3754-1/
| +| kernel-headers | CVE-2018-13095 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.8.1.el7a |
Expand...https://access.redhat.com/errata/RHSA-2019:1350
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/security/cve/CVE-2018-13095
https://bugzilla.kernel.org/show_bug.cgi?id=199915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13095
https://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git/commit/?h=for-next&id=23fcb3340d033d9f081e21e6c12c2db7eaa541d3
https://github.com/torvalds/linux/commit/23fcb3340d033d9f081e21e6c12c2db7eaa541d3
https://linux.oracle.com/cve/CVE-2018-13095.html
https://linux.oracle.com/errata/ELSA-2019-2029.html
https://ubuntu.com/security/notices/USN-4904-1
https://ubuntu.com/security/notices/USN-4907-1
| +| kernel-headers | CVE-2018-14609 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/104917
https://access.redhat.com/security/cve/CVE-2018-14609
https://bugzilla.kernel.org/show_bug.cgi?id=199833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14609
https://linux.oracle.com/cve/CVE-2018-14609.html
https://linux.oracle.com/errata/ELSA-2019-4570.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
https://patchwork.kernel.org/patch/10500521/
https://ubuntu.com/security/notices/USN-3821-1
https://ubuntu.com/security/notices/USN-3821-2
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/3821-1/
https://usn.ubuntu.com/3821-2/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2018/dsa-4308
| +| kernel-headers | CVE-2018-14612 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/104917
https://access.redhat.com/security/cve/CVE-2018-14612
https://bugzilla.kernel.org/show_bug.cgi?id=199847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14612
https://linux.oracle.com/cve/CVE-2018-14612.html
https://linux.oracle.com/errata/ELSA-2019-4570.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://patchwork.kernel.org/patch/10503403/
https://patchwork.kernel.org/patch/10503413/
https://ubuntu.com/security/notices/USN-3932-1
https://ubuntu.com/security/notices/USN-3932-2
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/3932-1/
https://usn.ubuntu.com/3932-2/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4118-1/
| +| kernel-headers | CVE-2018-14613 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/104917
https://access.redhat.com/security/cve/CVE-2018-14613
https://bugzilla.kernel.org/show_bug.cgi?id=199849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14613
https://linux.oracle.com/cve/CVE-2018-14613.html
https://linux.oracle.com/errata/ELSA-2020-5845.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://patchwork.kernel.org/patch/10503147/
https://ubuntu.com/security/notices/USN-3932-1
https://ubuntu.com/security/notices/USN-3932-2
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/3932-1/
https://usn.ubuntu.com/3932-2/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4118-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2018-16658 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.16.1.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
http://www.securityfocus.com/bid/105334
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2019:4154
https://access.redhat.com/security/cve/CVE-2018-16658
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16658
https://github.com/torvalds/linux/commit/8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
https://linux.oracle.com/cve/CVE-2018-16658.html
https://linux.oracle.com/errata/ELSA-2019-2029.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
https://ubuntu.com/security/notices/USN-3797-1
https://ubuntu.com/security/notices/USN-3797-2
https://ubuntu.com/security/notices/USN-3820-1
https://ubuntu.com/security/notices/USN-3820-2
https://ubuntu.com/security/notices/USN-3820-3
https://ubuntu.com/security/notices/USN-3822-1
https://ubuntu.com/security/notices/USN-3822-2
https://usn.ubuntu.com/3797-1/
https://usn.ubuntu.com/3797-2/
https://usn.ubuntu.com/3820-1/
https://usn.ubuntu.com/3820-2/
https://usn.ubuntu.com/3820-3/
https://usn.ubuntu.com/3822-1/
https://usn.ubuntu.com/3822-2/
https://www.debian.org/security/2018/dsa-4308
| +| kernel-headers | CVE-2018-18710 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
http://www.securityfocus.com/bid/106041
https://access.redhat.com/security/cve/CVE-2018-18710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18710
https://git.kernel.org/linus/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
https://linux.oracle.com/cve/CVE-2018-18710.html
https://linux.oracle.com/errata/ELSA-2019-4316.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://ubuntu.com/security/notices/USN-3846-1
https://ubuntu.com/security/notices/USN-3847-1
https://ubuntu.com/security/notices/USN-3847-2
https://ubuntu.com/security/notices/USN-3847-3
https://ubuntu.com/security/notices/USN-3848-1
https://ubuntu.com/security/notices/USN-3848-2
https://ubuntu.com/security/notices/USN-3849-1
https://ubuntu.com/security/notices/USN-3849-2
https://usn.ubuntu.com/3846-1/
https://usn.ubuntu.com/3847-1/
https://usn.ubuntu.com/3847-2/
https://usn.ubuntu.com/3847-3/
https://usn.ubuntu.com/3848-1/
https://usn.ubuntu.com/3848-2/
https://usn.ubuntu.com/3849-1/
https://usn.ubuntu.com/3849-2/
| +| kernel-headers | CVE-2018-19985 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html
http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/CVE-2018-19985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985
https://git.kernel.org/linus/5146f95df782b0ac61abde36567e718692725c89
https://hexhive.epfl.ch/projects/perifuzz/
https://linux.oracle.com/cve/CVE-2018-19985.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
https://seclists.org/bugtraq/2019/Jan/52
https://security.netapp.com/advisory/ntap-20190404-0002/
https://ubuntu.com/security/notices/USN-3910-1
https://ubuntu.com/security/notices/USN-3910-2
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
| +| kernel-headers | CVE-2018-6927 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-49.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a
http://www.securityfocus.com/bid/103023
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/security/cve/CVE-2018-6927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
https://github.com/torvalds/linux/commit/fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a
https://linux.oracle.com/cve/CVE-2018-6927.html
https://linux.oracle.com/errata/ELSA-2018-4193.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3697-1
https://ubuntu.com/security/notices/USN-3697-2
https://ubuntu.com/security/notices/USN-3698-1
https://ubuntu.com/security/notices/USN-3698-2
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3697-1/
https://usn.ubuntu.com/3697-2/
https://usn.ubuntu.com/3698-1/
https://usn.ubuntu.com/3698-2/
https://www.debian.org/security/2018/dsa-4187
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15
| +| kernel-headers | CVE-2018-7273 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.securityfocus.com/bid/103088
https://access.redhat.com/security/cve/CVE-2018-7273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7273
https://lkml.org/lkml/2018/2/20/669
https://www.exploit-db.com/exploits/44325/
| +| kernel-headers | CVE-2018-7757 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.el7a |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4a491b1ab11ca0556d2fda1ff1301e862a2d44c4
http://www.securityfocus.com/bid/103348
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/security/cve/CVE-2018-7757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
https://github.com/torvalds/linux/commit/4a491b1ab11ca0556d2fda1ff1301e862a2d44c4
https://linux.oracle.com/cve/CVE-2018-7757.html
https://linux.oracle.com/errata/ELSA-2019-4316.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://ubuntu.com/security/notices/USN-3654-1
https://ubuntu.com/security/notices/USN-3654-2
https://ubuntu.com/security/notices/USN-3656-1
https://ubuntu.com/security/notices/USN-3697-1
https://ubuntu.com/security/notices/USN-3697-2
https://ubuntu.com/security/notices/USN-3698-1
https://ubuntu.com/security/notices/USN-3698-2
https://usn.ubuntu.com/3654-1/
https://usn.ubuntu.com/3654-2/
https://usn.ubuntu.com/3656-1/
https://usn.ubuntu.com/3697-1/
https://usn.ubuntu.com/3697-2/
https://usn.ubuntu.com/3698-1/
https://usn.ubuntu.com/3698-2/
https://www.debian.org/security/2018/dsa-4187
https://www.debian.org/security/2018/dsa-4188
| +| kernel-headers | CVE-2019-0136 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.18.2.el7 |
Expand...http://jvn.jp/en/jp/JVN75617741/index.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://www.securityfocus.com/bid/108777
https://access.redhat.com/security/cve/CVE-2019-0136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0136
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://support.lenovo.com/us/en/product_security/LEN-27828
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4145-1
https://ubuntu.com/security/notices/USN-4147-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4145-1/
https://usn.ubuntu.com/4147-1/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html
| +| kernel-headers | CVE-2019-10638 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.securityfocus.com/bid/109092
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/CVE-2019-10638
https://arxiv.org/pdf/1906.10478.pdf
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=355b98553789b646ed97ad801a619ff898471b92
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df453700e8d81b1bdafdf684365ee2b9431fb702
https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92
https://github.com/torvalds/linux/commit/55f0fc7a02de8f12757f4937143d8d5091b2e40b
https://github.com/torvalds/linux/commit/df453700e8d81b1bdafdf684365ee2b9431fb702
https://linux.oracle.com/cve/CVE-2019-10638.html
https://linux.oracle.com/errata/ELSA-2020-5845.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20190806-0001/
https://ubuntu.com/security/notices/USN-4114-1
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4116-1
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4114-1/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4116-1/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-10639 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
https://access.redhat.com/security/cve/CVE-2019-10639
https://arxiv.org/pdf/1906.10478.pdf
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=355b98553789b646ed97ad801a619ff898471b92
https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92
https://linux.oracle.com/cve/CVE-2019-10639.html
https://linux.oracle.com/errata/ELSA-2020-5845.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://seclists.org/bugtraq/2019/Aug/18
https://security.netapp.com/advisory/ntap-20190806-0001/
https://support.f5.com/csp/article/K32804955
https://support.f5.com/csp/article/K32804955?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4497
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-11190 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://www.openwall.com/lists/oss-security/2019/04/15/1
http://www.securityfocus.com/bid/107890
https://access.redhat.com/security/cve/CVE-2019-11190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11190
https://git.kernel.org/linus/9f834ec18defc369d73ccf9e87a2790bfa05bf46 (4.8-rc5)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=a5b5352558f6808db0589644ea5401b3e3148a0d
https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=e1676b55d874a43646e8b2c46d87f2f3e45516ff
https://linux.oracle.com/cve/CVE-2019-11190.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
https://ubuntu.com/security/notices/USN-4008-1
https://ubuntu.com/security/notices/USN-4008-3
https://usn.ubuntu.com/4008-1/
https://usn.ubuntu.com/4008-2/
https://usn.ubuntu.com/4008-3/
https://www.openwall.com/lists/oss-security/2019/04/03/4
https://www.openwall.com/lists/oss-security/2019/04/03/4/1
| +| kernel-headers | CVE-2019-12380 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108477
https://access.redhat.com/security/cve/CVE-2019-12380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
https://linux.oracle.com/cve/CVE-2019-12380.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
| +| kernel-headers | CVE-2019-12614 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.21.2.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.securityfocus.com/bid/108550
https://access.redhat.com/security/cve/CVE-2019-12614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614
https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=efa9ace68e487ddd29c2b4d6dd23242158f1f607
https://linux.oracle.com/cve/CVE-2019-12614.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
https://lkml.org/lkml/2019/6/3/526
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20190710-0002/
https://support.f5.com/csp/article/K54337315
https://support.f5.com/csp/article/K54337315?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4093-1
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4095-1
https://ubuntu.com/security/notices/USN-4095-2
https://usn.ubuntu.com/4093-1/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4095-1/
https://usn.ubuntu.com/4095-2/
| +| kernel-headers | CVE-2019-15090 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2019-15090
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15090
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c09581a52765a85f19fc35340127396d5e3379cc
https://github.com/torvalds/linux/commit/c09581a52765a85f19fc35340127396d5e3379cc
https://linux.oracle.com/cve/CVE-2019-15090.html
https://linux.oracle.com/errata/ELSA-2020-1769.html
https://security.netapp.com/advisory/ntap-20190905-0002/
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4147-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4147-1/
| +| kernel-headers | CVE-2019-15099 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.19.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2019-15099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15099
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=bfd6e6e6c5d2ee43a3d9902b36e01fc7527ebb27
https://linux.oracle.com/cve/CVE-2019-15099.html
https://linux.oracle.com/errata/ELSA-2020-1769.html
https://lore.kernel.org/linux-wireless/20190804003101.11541-1-benquike@gmail.com/T/#u
https://lore.kernel.org/linux-wireless/20191018133516.12606-1-linux@roeck-us.net/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://support.f5.com/csp/article/K76295179
https://support.f5.com/csp/article/K76295179?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| kernel-headers | CVE-2019-15217 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
http://www.openwall.com/lists/oss-security/2019/08/22/2
http://www.openwall.com/lists/oss-security/2019/08/22/3
http://www.openwall.com/lists/oss-security/2019/08/22/4
http://www.openwall.com/lists/oss-security/2019/08/22/5
https://access.redhat.com/security/cve/CVE-2019-15217
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e
https://linux.oracle.com/cve/CVE-2019-15217.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=9c0c178c24d828a7378f483309001329750aad64
https://ubuntu.com/security/notices/USN-4147-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4302-1
https://usn.ubuntu.com/4147-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4302-1/
| +| kernel-headers | CVE-2019-15218 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
http://www.openwall.com/lists/oss-security/2019/08/22/2
http://www.openwall.com/lists/oss-security/2019/08/22/3
http://www.openwall.com/lists/oss-security/2019/08/22/4
http://www.openwall.com/lists/oss-security/2019/08/22/5
https://access.redhat.com/security/cve/CVE-2019-15218
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15218
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=31e0456de5be379b10fea0fa94a681057114a96e
https://linux.oracle.com/cve/CVE-2019-15218.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=4a5d7c8c2b6dbedb5b7218c6d7e8666bd2387517
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4147-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4147-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-15219 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
http://www.openwall.com/lists/oss-security/2019/08/22/2
http://www.openwall.com/lists/oss-security/2019/08/22/3
http://www.openwall.com/lists/oss-security/2019/08/22/4
http://www.openwall.com/lists/oss-security/2019/08/22/5
https://access.redhat.com/security/cve/CVE-2019-15219
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15219
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a5729f68d3a82786aea110b1bfe610be318f80a
https://linux.oracle.com/cve/CVE-2019-15219.html
https://linux.oracle.com/errata/ELSA-2019-4878.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=aaf6794922521df1c35c81e32cb2d0bb6a351e7b
| +| kernel-headers | CVE-2019-15221 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://access.redhat.com/security/cve/CVE-2019-15221
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15221
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3450121997ce872eb7f1248417225827ea249710
https://linux.oracle.com/cve/CVE-2019-15221.html
https://linux.oracle.com/errata/ELSA-2020-1769.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=240f09164db2c3d3af33a117c713dc7650dc29d6
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4147-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4147-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
| +| kernel-headers | CVE-2019-15291 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
http://www.openwall.com/lists/oss-security/2019/08/22/1
https://access.redhat.com/security/cve/CVE-2019-15291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15291
https://linux.oracle.com/cve/CVE-2019-15291.html
https://linux.oracle.com/errata/ELSA-2020-5569.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=c0203bd72037d07493f4b7562411e4f5f4553a8f
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.openwall.com/lists/oss-security/2019/08/20/2
| +| kernel-headers | CVE-2019-15807 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-15807
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15807
https://git.kernel.org/linus/3b0541791453fbe7f42867e310e0c9eb6295364d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0541791453fbe7f42867e310e0c9eb6295364d
https://linux.oracle.com/cve/CVE-2019-15807.html
https://linux.oracle.com/errata/ELSA-2020-5512.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K52136304?utm_source=f5support&utm_medium=RSS
| +| kernel-headers | CVE-2019-15921 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2019-15921
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15921
https://git.kernel.org/linus/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| kernel-headers | CVE-2019-15924 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2019-15924
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15924
https://git.kernel.org/linus/01ca667133d019edc9f0a1f70a272447c84ec41f
https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| kernel-headers | CVE-2019-16229 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-16229
https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| kernel-headers | CVE-2019-16230 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-16230
https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| kernel-headers | CVE-2019-16231 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
https://access.redhat.com/security/cve/CVE-2019-16231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d
https://linux.oracle.com/cve/CVE-2019-16231.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| kernel-headers | CVE-2019-16233 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
https://access.redhat.com/security/cve/CVE-2019-16233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
https://linux.oracle.com/cve/CVE-2019-16233.html
https://linux.oracle.com/errata/ELSA-2020-5508.html
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4346-1/
| +| kernel-headers | CVE-2019-16234 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://access.redhat.com/security/cve/CVE-2019-16234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
https://linux.oracle.com/cve/CVE-2019-16234.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
| +| kernel-headers | CVE-2019-16994 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-16994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07f12b26e21ab359261bf75cfcb424fdc7daeb6d
https://git.kernel.org/linus/07f12b26e21ab359261bf75cfcb424fdc7daeb6d
https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d
https://linux.oracle.com/cve/CVE-2019-16994.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://security.netapp.com/advisory/ntap-20191031-0005/
| +| kernel-headers | CVE-2019-18806 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-18806
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18806
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1acb8f2a7a9f10543868ddd737e37424d5c36cf4
https://git.kernel.org/linus/1acb8f2a7a9f10543868ddd737e37424d5c36cf4
https://linux.oracle.com/cve/CVE-2019-18806.html
https://linux.oracle.com/errata/ELSA-2020-5649.html
| +| kernel-headers | CVE-2019-18885 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
https://access.redhat.com/security/cve/CVE-2019-18885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18885
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ba3bc9dd150457c506e4661380a6183af651c1
https://github.com/bobfuzzer/CVE-2019-18885
https://github.com/torvalds/linux/commit/09ba3bc9dd150457c506e4661380a6183af651c1
https://linux.oracle.com/cve/CVE-2019-18885.html
https://linux.oracle.com/errata/ELSA-2020-5885.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-19039 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19039
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://ubuntu.com/security/notices/USN-4414-1
https://usn.ubuntu.com/4414-1/
| +| kernel-headers | CVE-2019-19054 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054
https://github.com/torvalds/linux/commit/a7b2df76b42bdd026e3106cf2ba97db41345a177
https://linux.oracle.com/cve/CVE-2019-19054.html
https://linux.oracle.com/errata/ELSA-2020-5878.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4525-1
https://ubuntu.com/security/notices/USN-4526-1
https://ubuntu.com/security/notices/USN-4527-1
https://usn.ubuntu.com/4525-1/
https://usn.ubuntu.com/4526-1/
https://usn.ubuntu.com/4527-1/
| +| kernel-headers | CVE-2019-19056 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056
https://github.com/torvalds/linux/commit/db8fd2cde93227e566a412cf53173ffa227998bc
https://linux.oracle.com/cve/CVE-2019-19056.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4300-1
https://ubuntu.com/security/notices/USN-4301-1
https://ubuntu.com/security/notices/USN-4302-1
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4300-1/
https://usn.ubuntu.com/4301-1/
https://usn.ubuntu.com/4302-1/
| +| kernel-headers | CVE-2019-19057 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-19057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19057
https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050c
https://linux.oracle.com/cve/CVE-2019-19057.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| kernel-headers | CVE-2019-19058 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058
https://github.com/torvalds/linux/commit/b4b814fec1a5a849383f7b3886b654a13abbda7d
https://linux.oracle.com/cve/CVE-2019-19058.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4300-1
https://ubuntu.com/security/notices/USN-4301-1
https://ubuntu.com/security/notices/USN-4302-1
https://usn.ubuntu.com/4300-1/
https://usn.ubuntu.com/4301-1/
https://usn.ubuntu.com/4302-1/
| +| kernel-headers | CVE-2019-19059 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-19059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19059
https://github.com/torvalds/linux/commit/0f4f199443faca715523b0659aa536251d8b978f
https://linux.oracle.com/cve/CVE-2019-19059.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4300-1
https://ubuntu.com/security/notices/USN-4301-1
https://usn.ubuntu.com/4300-1/
https://usn.ubuntu.com/4301-1/
| +| kernel-headers | CVE-2019-19062 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.26.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-19062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062
https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc
https://linux.oracle.com/cve/CVE-2019-19062.html
https://linux.oracle.com/errata/ELSA-2020-5837.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| kernel-headers | CVE-2019-19063 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-19063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063
https://github.com/torvalds/linux/commit/3f93616951138a598d930dcaec40f2bfd9ce43bb
https://linux.oracle.com/cve/CVE-2019-19063.html
https://linux.oracle.com/errata/ELSA-2021-9473.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-19065 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19065
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19065
https://github.com/torvalds/linux/commit/34b3be18a04ecdc610aae4c48e5d1b799d8689f6
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4210-1
https://ubuntu.com/security/notices/USN-4226-1
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4210-1/
https://usn.ubuntu.com/4226-1/
| +| kernel-headers | CVE-2019-19066 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19066
https://github.com/torvalds/linux/commit/0e62395da2bd5166d7c9e14cbc7503b256a34cb0
https://linux.oracle.com/cve/CVE-2019-19066.html
https://linux.oracle.com/errata/ELSA-2021-9473.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4300-1
https://ubuntu.com/security/notices/USN-4301-1
https://ubuntu.com/security/notices/USN-4302-1
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4300-1/
https://usn.ubuntu.com/4301-1/
https://usn.ubuntu.com/4302-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-19073 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073
https://github.com/torvalds/linux/commit/853acf7caf10b828102d92d05b5c101666a6142b
https://linux.oracle.com/cve/CVE-2019-19073.html
https://linux.oracle.com/errata/ELSA-2020-5881.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4526-1
https://ubuntu.com/security/notices/USN-4527-1
https://usn.ubuntu.com/4526-1/
https://usn.ubuntu.com/4527-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-19074 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074
https://github.com/torvalds/linux/commit/728c1e2a05e4b5fc52fab3421dce772a806612a2
https://linux.oracle.com/cve/CVE-2019-19074.html
https://linux.oracle.com/errata/ELSA-2021-9473.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4526-1
https://ubuntu.com/security/notices/USN-4527-1
https://usn.ubuntu.com/4526-1/
https://usn.ubuntu.com/4527-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-19080 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19080
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19080
https://github.com/torvalds/linux/commit/8572cea1461a006bce1d06c0c4b0575869125fa4
https://security.netapp.com/advisory/ntap-20191205-0001/
| +| kernel-headers | CVE-2019-19081 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19081
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19081
https://github.com/torvalds/linux/commit/8ce39eb5a67aee25d9f05b40b673c95b23502e3e
https://security.netapp.com/advisory/ntap-20191205-0001/
| +| kernel-headers | CVE-2019-19082 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19082
https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| kernel-headers | CVE-2019-19083 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19083
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083
https://github.com/torvalds/linux/commit/055e547478a11a6360c7ce05e2afc3e366968a12
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| kernel-headers | CVE-2019-19378 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| kernel-headers | CVE-2019-19533 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19533
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19533
https://git.kernel.org/linus/a10feaf8c464c3f9cfdd3a8a7ce17e1c0d498da1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a10feaf8c464c3f9cfdd3a8a7ce17e1c0d498da1
https://linux.oracle.com/cve/CVE-2019-19533.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
| +| kernel-headers | CVE-2019-19922 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.19.1.el7a |
Expand...https://access.redhat.com/security/cve/CVE-2019-19922
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19922
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de53fd7aedb100f03e5d2231cfce0e4993282425
https://git.kernel.org/linus/de53fd7aedb100f03e5d2231cfce0e4993282425
https://github.com/kubernetes/kubernetes/issues/67577
https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425
https://linux.oracle.com/cve/CVE-2019-19922.html
https://linux.oracle.com/errata/ELSA-2020-5845.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://relistan.com/the-kernel-may-be-slowing-down-your-app
https://security.netapp.com/advisory/ntap-20200204-0002/
https://ubuntu.com/security/notices/USN-4226-1
https://usn.ubuntu.com/4226-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| kernel-headers | CVE-2019-19965 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19965
https://git.kernel.org/linus/f70267f379b5e5e11bdc5d72a56bf17e5feed01f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f70267f379b5e5e11bdc5d72a56bf17e5feed01f
https://linux.oracle.com/cve/CVE-2019-19965.html
https://linux.oracle.com/errata/ELSA-2020-5879.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://security.netapp.com/advisory/ntap-20200204-0002/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| kernel-headers | CVE-2019-20054 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.19.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-20054
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20054
https://git.kernel.org/linus/23da9588037ecdd4901db76a5b79a42b529c4ec3
https://git.kernel.org/linus/89189557b47b35683a27c80ee78aef18248eefb4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=23da9588037ecdd4901db76a5b79a42b529c4ec3
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89189557b47b35683a27c80ee78aef18248eefb4
https://linux.oracle.com/cve/CVE-2019-20054.html
https://linux.oracle.com/errata/ELSA-2020-5879.html
https://security.netapp.com/advisory/ntap-20200204-0002/
| +| kernel-headers | CVE-2019-20095 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.19.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-20095
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20095
https://git.kernel.org/linus/003b686ace820ce2d635a83f10f2d7f9c147dabc
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=003b686ace820ce2d635a83f10f2d7f9c147dabc
https://linux.oracle.com/cve/CVE-2019-20095.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://security.netapp.com/advisory/ntap-20200204-0002/
| +| kernel-headers | CVE-2019-20096 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html
https://access.redhat.com/security/cve/CVE-2019-20096
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20096
https://git.kernel.org/linus/1d3ff0950e2b40dc861b1739029649d03f591820
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1d3ff0950e2b40dc861b1739029649d03f591820
https://linux.oracle.com/cve/CVE-2019-20096.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| kernel-headers | CVE-2020-10690 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-10690
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690
https://linux.oracle.com/cve/CVE-2020-10690.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lore.kernel.org/linux-fsdevel/20191125125342.6189-1-vdronov@redhat.com/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-10690
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4419-1
https://usn.ubuntu.com/4419-1/
| +| kernel-headers | CVE-2020-10773 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-10773
https://bugzilla.redhat.com/show_bug.cgi?id=1846380
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10773
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f
https://linux.oracle.com/cve/CVE-2020-10773.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
| +| kernel-headers | CVE-2020-10781 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-10781
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10781
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=853eab68afc80f59f36bbdeb715e5c88c501e680
https://linux.oracle.com/cve/CVE-2020-10781.html
https://linux.oracle.com/errata/ELSA-2020-5885.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lore.kernel.org/linux-block/20200617103412.GA2027053@kroah.com/
https://nvd.nist.gov/vuln/detail/CVE-2020-10781
https://ubuntu.com/security/notices/USN-4483-1
https://ubuntu.com/security/notices/USN-4485-1
https://www.openwall.com/lists/oss-security/2020/06/18/1
| +| kernel-headers | CVE-2020-10942 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
http://www.openwall.com/lists/oss-security/2020/04/15/4
https://access.redhat.com/security/cve/CVE-2020-10942
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
https://git.kernel.org/linus/42d84c8490f9f0931786f1623191fcab397c3d64
https://linux.oracle.com/cve/CVE-2020-10942.html
https://linux.oracle.com/errata/ELSA-2020-5663.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lkml.org/lkml/2020/2/15/125
https://nvd.nist.gov/vuln/detail/CVE-2020-10942
https://security.netapp.com/advisory/ntap-20200403-0003/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4364-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4364-1/
https://www.debian.org/security/2020/dsa-4667
https://www.debian.org/security/2020/dsa-4698
| +| kernel-headers | CVE-2020-11608 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-11608
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30
https://git.kernel.org/linus/998912346c0da53a6dbb71fab3a138586b596b30
https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30
https://linux.oracle.com/cve/CVE-2020-11608.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-11608
https://security.netapp.com/advisory/ntap-20200430-0004/
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4364-1
https://ubuntu.com/security/notices/USN-4368-1
https://ubuntu.com/security/notices/USN-4369-1
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4364-1/
https://usn.ubuntu.com/4368-1/
https://usn.ubuntu.com/4369-1/
https://www.debian.org/security/2020/dsa-4698
| +| kernel-headers | CVE-2020-11609 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-11609
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=485b06aadb933190f4bc44e006076bc27a23f205
https://git.kernel.org/linus/485b06aadb933190f4bc44e006076bc27a23f205
https://github.com/torvalds/linux/commit/485b06aadb933190f4bc44e006076bc27a23f205
https://linux.oracle.com/cve/CVE-2020-11609.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-11609
https://security.netapp.com/advisory/ntap-20200430-0004/
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4364-1
https://ubuntu.com/security/notices/USN-4368-1
https://ubuntu.com/security/notices/USN-4369-1
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4364-1/
https://usn.ubuntu.com/4368-1/
https://usn.ubuntu.com/4369-1/
https://www.debian.org/security/2020/dsa-4698
| +| kernel-headers | CVE-2020-12652 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-12652
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.14
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=28d76df18f0ad5bcf5fa48510b225f0ed262a99b
https://git.kernel.org/linus/28d76df18f0ad5bcf5fa48510b225f0ed262a99b (5.5-rc7)
https://github.com/torvalds/linux/commit/28d76df18f0ad5bcf5fa48510b225f0ed262a99b
https://linux.oracle.com/cve/CVE-2020-12652.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://security.netapp.com/advisory/ntap-20200608-0001/
https://www.debian.org/security/2020/dsa-4698
| +| kernel-headers | CVE-2020-12655 | LOW | 3.10.0-1062.7.1.el7 | 4.14.0-115.29.1.el7a |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-12655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12655
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d0c7feaf87678371c2c09b3709400be416b2dc62
https://git.kernel.org/linus/d0c7feaf87678371c2c09b3709400be416b2dc62 (5.7-rc1)
https://github.com/torvalds/linux/commit/d0c7feaf87678371c2c09b3709400be416b2dc62
https://linux.oracle.com/cve/CVE-2020-12655.html
https://linux.oracle.com/errata/ELSA-2020-5756.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES5C6ZCMALBEBMKNNCTBSLLSYGFZG3FF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IO5XIQSRI747P4RVVTNX7TUPEOCF4OPU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ2X3TM6RGRUS3KZAS26IJO5XGU7TBBR/
https://lore.kernel.org/linux-xfs/20200221153803.GP9506@magnolia/
https://nvd.nist.gov/vuln/detail/CVE-2020-12655
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4465-1
https://ubuntu.com/security/notices/USN-4483-1
https://ubuntu.com/security/notices/USN-4485-1
https://ubuntu.com/security/notices/USN-5343-1
https://usn.ubuntu.com/4465-1/
https://usn.ubuntu.com/4483-1/
https://usn.ubuntu.com/4485-1/
| +| kernel-headers | CVE-2020-12656 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
https://access.redhat.com/security/cve/CVE-2020-12656
https://bugzilla.kernel.org/show_bug.cgi?id=206651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12656
https://nvd.nist.gov/vuln/detail/CVE-2020-12656
https://ubuntu.com/security/notices/USN-4483-1
https://ubuntu.com/security/notices/USN-4485-1
https://usn.ubuntu.com/4483-1/
https://usn.ubuntu.com/4485-1/
| +| kernel-headers | CVE-2020-14304 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-14304
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| +| kernel-headers | CVE-2020-14390 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
https://access.redhat.com/security/cve/CVE-2020-14390
https://bugzilla.redhat.com/show_bug.cgi?id=1876788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390
https://git.kernel.org/linus/50145474f6ef4a9c19205b173da6264a644c7489
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50145474f6ef4a9c19205b173da6264a644c7489
https://linux.oracle.com/cve/CVE-2020-14390.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14390
https://seclists.org/oss-sec/2020/q3/174
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4912-1
https://www.openwall.com/lists/oss-security/2020/09/15/2
| +| kernel-headers | CVE-2020-26146 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26146
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26146.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
| +| kernel-headers | CVE-2020-26147 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26147
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26147.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
| +| kernel-headers | CVE-2020-27820 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27820
https://bugzilla.redhat.com/show_bug.cgi?id=1901726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2020-27820.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201125202648.5220-1-jcline@redhat.com/
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5415-1
| +| kernel-headers | CVE-2020-29660 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
http://www.openwall.com/lists/oss-security/2020/12/10/1
https://access.redhat.com/security/cve/CVE-2020-29660
https://bugs.chromium.org/p/project-zero/issues/detail?id=2125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660
https://git.kernel.org/linus/c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
https://linux.oracle.com/cve/CVE-2020-29660.html
https://linux.oracle.com/errata/ELSA-2021-9039.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/
https://nvd.nist.gov/vuln/detail/CVE-2020-29660
https://security.netapp.com/advisory/ntap-20210122-0001/
https://ubuntu.com/security/notices/USN-4748-1
https://ubuntu.com/security/notices/USN-4749-1
https://ubuntu.com/security/notices/USN-4750-1
https://ubuntu.com/security/notices/USN-4751-1
https://ubuntu.com/security/notices/USN-4752-1
https://ubuntu.com/security/notices/USN-5130-1
https://www.debian.org/security/2021/dsa-4843
| +| kernel-headers | CVE-2020-35501 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35501
https://bugzilla.redhat.com/show_bug.cgi?id=1908577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://nvd.nist.gov/vuln/detail/CVE-2020-35501
https://www.openwall.com/lists/oss-security/2021/02/18/1
| +| kernel-headers | CVE-2021-31916 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-31916
https://bugzilla.redhat.com/show_bug.cgi?id=1946965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31916
https://git.kernel.org/linus/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a
https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a
https://linux.oracle.com/cve/CVE-2021-31916.html
https://linux.oracle.com/errata/ELSA-2021-9346.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2021-31916
https://seclists.org/oss-sec/2021/q1/268
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.openwall.com/lists/oss-security/2021/03/28/1
| +| kernel-headers | CVE-2021-33135 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33135
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00603.html
| +| kernel-headers | CVE-2021-3635 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-3635
https://bugzilla.redhat.com/show_bug.cgi?id=1976946
https://linux.oracle.com/cve/CVE-2021-3635.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
| +| kernel-headers | CVE-2021-3659 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3659
https://git.kernel.org/linus/1165affd484889d4986cf3b724318935a0b120d8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8
https://linux.oracle.com/cve/CVE-2021-3659.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
| +| kernel-headers | CVE-2021-38198 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-38198
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198
https://github.com/torvalds/linux/commit/b1bd5cba3306691c771d558e94baa73e8b0b96b7
https://linux.oracle.com/cve/CVE-2021-38198.html
https://linux.oracle.com/errata/ELSA-2021-9475.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-38198
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5343-1
| +| kernel-headers | CVE-2022-24448 | LOW | 3.10.0-1062.7.1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-24448
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf
https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a
https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf
https://linux.oracle.com/cve/CVE-2022-24448.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a@huawei.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2022-24448
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5384-1
https://ubuntu.com/security/notices/USN-5385-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
https://www.spinics.net/lists/stable/msg531976.html
| +| krb5-devel | CVE-2014-5351 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://advisories.mageia.org/MGASA-2014-0477.html
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html
http://security.gentoo.org/glsa/glsa-201412-53.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2014:224
http://www.securityfocus.com/bid/70380
http://www.securitytracker.com/id/1031003
http://www.ubuntu.com/usn/USN-2498-1
https://access.redhat.com/security/cve/CVE-2014-5351
https://bugzilla.redhat.com/show_bug.cgi?id=1145425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351
https://exchange.xforce.ibmcloud.com/vulnerabilities/97028
https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
https://ubuntu.com/security/notices/USN-2498-1
| +| krb5-devel | CVE-2015-2695 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/90687
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
| +| krb5-devel | CVE-2015-2696 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.securityfocus.com/bid/90675
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
| +| krb5-devel | CVE-2015-2697 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/77581
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
| +| krb5-devel | CVE-2017-15088 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
| +| krb5-devel | CVE-2020-17049 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/10/3
https://access.redhat.com/security/cve/CVE-2020-17049
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049
| +| krb5-devel | CVE-2020-28196 | MEDIUM | 1.15.1-46.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196
https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
https://linux.oracle.com/cve/CVE-2020-28196.html
https://linux.oracle.com/errata/ELSA-2021-9294.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
https://nvd.nist.gov/vuln/detail/CVE-2020-28196
https://security.gentoo.org/glsa/202011-17
https://security.netapp.com/advisory/ntap-20201202-0001/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4635-1
https://www.debian.org/security/2020/dsa-4795
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| krb5-devel | CVE-2021-36222 | MEDIUM | 1.15.1-46.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| krb5-devel | CVE-2021-37750 | MEDIUM | 1.15.1-46.el7 | 1.15.1-51.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| krb5-devel | CVE-2017-11462 | LOW | 1.15.1-46.el7 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
| +| krb5-libs | CVE-2014-5351 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://advisories.mageia.org/MGASA-2014-0477.html
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html
http://security.gentoo.org/glsa/glsa-201412-53.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2014:224
http://www.securityfocus.com/bid/70380
http://www.securitytracker.com/id/1031003
http://www.ubuntu.com/usn/USN-2498-1
https://access.redhat.com/security/cve/CVE-2014-5351
https://bugzilla.redhat.com/show_bug.cgi?id=1145425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351
https://exchange.xforce.ibmcloud.com/vulnerabilities/97028
https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
https://ubuntu.com/security/notices/USN-2498-1
| +| krb5-libs | CVE-2015-2695 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/90687
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
| +| krb5-libs | CVE-2015-2696 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.securityfocus.com/bid/90675
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
| +| krb5-libs | CVE-2015-2697 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/77581
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
| +| krb5-libs | CVE-2017-15088 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
| +| krb5-libs | CVE-2020-17049 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/10/3
https://access.redhat.com/security/cve/CVE-2020-17049
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049
| +| krb5-libs | CVE-2020-28196 | MEDIUM | 1.15.1-46.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196
https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
https://linux.oracle.com/cve/CVE-2020-28196.html
https://linux.oracle.com/errata/ELSA-2021-9294.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
https://nvd.nist.gov/vuln/detail/CVE-2020-28196
https://security.gentoo.org/glsa/202011-17
https://security.netapp.com/advisory/ntap-20201202-0001/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4635-1
https://www.debian.org/security/2020/dsa-4795
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| krb5-libs | CVE-2021-36222 | MEDIUM | 1.15.1-46.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| krb5-libs | CVE-2021-37750 | MEDIUM | 1.15.1-46.el7 | 1.15.1-51.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| krb5-libs | CVE-2017-11462 | LOW | 1.15.1-46.el7 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
| +| less | CVE-2014-9488 | LOW | 458-9.el7 | |
Expand...http://advisories.mageia.org/MGASA-2015-0139.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159449.html
http://lists.opensuse.org/opensuse-updates/2015-03/msg00077.html
http://www.mandriva.com/security/advisories?name=MDVSA-2015:199
http://www.openwall.com/lists/oss-security/2015/03/10/14
https://access.redhat.com/security/cve/CVE-2014-9488
https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9488
| +| libX11 | CVE-2021-31535 | HIGH | 1.6.7-3.el7_9 | 1.6.7-4.el7_9 |
Expand...http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html
http://seclists.org/fulldisclosure/2021/May/52
http://www.openwall.com/lists/oss-security/2021/05/18/2
https://access.redhat.com/security/cve/CVE-2021-31535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605
https://linux.oracle.com/cve/CVE-2021-31535.html
https://linux.oracle.com/errata/ELSA-2021-4326.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/
https://lists.freedesktop.org/archives/xorg/
https://lists.x.org/archives/xorg-announce/2021-May/003088.html
https://security.gentoo.org/glsa/202105-16
https://security.netapp.com/advisory/ntap-20210813-0001/
https://ubuntu.com/security/notices/USN-4966-1
https://ubuntu.com/security/notices/USN-4966-2
https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/
https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt
https://www.debian.org/security/2021/dsa-4920
https://www.openwall.com/lists/oss-security/2021/05/18/2
https://www.openwall.com/lists/oss-security/2021/05/18/3
| +| libX11 | CVE-2016-7943 | MEDIUM | 1.6.7-3.el7_9 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93362
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7943
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
| +| libX11 | CVE-2020-14344 | MEDIUM | 1.6.7-3.el7_9 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html
https://access.redhat.com/security/cve/CVE-2020-14344
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
https://linux.oracle.com/cve/CVE-2020-14344.html
https://linux.oracle.com/errata/ELSA-2021-1804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/
https://lists.x.org/archives/xorg-announce/2020-July/003050.html
https://security.gentoo.org/glsa/202008-18
https://ubuntu.com/security/notices/USN-4487-1
https://ubuntu.com/security/notices/USN-4487-2
https://usn.ubuntu.com/4487-1/
https://usn.ubuntu.com/4487-2/
https://www.openwall.com/lists/oss-security/2020/07/31/1
| +| libX11 | CVE-2016-7942 | LOW | 1.6.7-3.el7_9 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93363
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7942
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
| +| libX11-common | CVE-2021-31535 | HIGH | 1.6.7-3.el7_9 | 1.6.7-4.el7_9 |
Expand...http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html
http://seclists.org/fulldisclosure/2021/May/52
http://www.openwall.com/lists/oss-security/2021/05/18/2
https://access.redhat.com/security/cve/CVE-2021-31535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605
https://linux.oracle.com/cve/CVE-2021-31535.html
https://linux.oracle.com/errata/ELSA-2021-4326.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/
https://lists.freedesktop.org/archives/xorg/
https://lists.x.org/archives/xorg-announce/2021-May/003088.html
https://security.gentoo.org/glsa/202105-16
https://security.netapp.com/advisory/ntap-20210813-0001/
https://ubuntu.com/security/notices/USN-4966-1
https://ubuntu.com/security/notices/USN-4966-2
https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/
https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt
https://www.debian.org/security/2021/dsa-4920
https://www.openwall.com/lists/oss-security/2021/05/18/2
https://www.openwall.com/lists/oss-security/2021/05/18/3
| +| libX11-common | CVE-2016-7943 | MEDIUM | 1.6.7-3.el7_9 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93362
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7943
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
| +| libX11-common | CVE-2020-14344 | MEDIUM | 1.6.7-3.el7_9 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html
https://access.redhat.com/security/cve/CVE-2020-14344
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
https://linux.oracle.com/cve/CVE-2020-14344.html
https://linux.oracle.com/errata/ELSA-2021-1804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/
https://lists.x.org/archives/xorg-announce/2020-July/003050.html
https://security.gentoo.org/glsa/202008-18
https://ubuntu.com/security/notices/USN-4487-1
https://ubuntu.com/security/notices/USN-4487-2
https://usn.ubuntu.com/4487-1/
https://usn.ubuntu.com/4487-2/
https://www.openwall.com/lists/oss-security/2020/07/31/1
| +| libX11-common | CVE-2016-7942 | LOW | 1.6.7-3.el7_9 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93363
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7942
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
| +| libX11-devel | CVE-2021-31535 | HIGH | 1.6.7-3.el7_9 | 1.6.7-4.el7_9 |
Expand...http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html
http://seclists.org/fulldisclosure/2021/May/52
http://www.openwall.com/lists/oss-security/2021/05/18/2
https://access.redhat.com/security/cve/CVE-2021-31535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605
https://linux.oracle.com/cve/CVE-2021-31535.html
https://linux.oracle.com/errata/ELSA-2021-4326.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/
https://lists.freedesktop.org/archives/xorg/
https://lists.x.org/archives/xorg-announce/2021-May/003088.html
https://security.gentoo.org/glsa/202105-16
https://security.netapp.com/advisory/ntap-20210813-0001/
https://ubuntu.com/security/notices/USN-4966-1
https://ubuntu.com/security/notices/USN-4966-2
https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/
https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt
https://www.debian.org/security/2021/dsa-4920
https://www.openwall.com/lists/oss-security/2021/05/18/2
https://www.openwall.com/lists/oss-security/2021/05/18/3
| +| libX11-devel | CVE-2016-7943 | MEDIUM | 1.6.7-3.el7_9 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93362
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7943
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
| +| libX11-devel | CVE-2020-14344 | MEDIUM | 1.6.7-3.el7_9 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html
https://access.redhat.com/security/cve/CVE-2020-14344
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
https://linux.oracle.com/cve/CVE-2020-14344.html
https://linux.oracle.com/errata/ELSA-2021-1804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/
https://lists.x.org/archives/xorg-announce/2020-July/003050.html
https://security.gentoo.org/glsa/202008-18
https://ubuntu.com/security/notices/USN-4487-1
https://ubuntu.com/security/notices/USN-4487-2
https://usn.ubuntu.com/4487-1/
https://usn.ubuntu.com/4487-2/
https://www.openwall.com/lists/oss-security/2020/07/31/1
| +| libX11-devel | CVE-2016-7942 | LOW | 1.6.7-3.el7_9 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93363
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7942
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
| +| libXfixes | CVE-2016-7944 | MEDIUM | 5.0.3-1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93361
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7944
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CE6VJWBMOWLSCH4OP4TAEPIA7NP53ON/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GE43MDCRGS4R7MRRZNVSLREHRLU5OHCV/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-5437-1
| +| libXfixes-devel | CVE-2016-7944 | MEDIUM | 5.0.3-1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93361
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7944
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CE6VJWBMOWLSCH4OP4TAEPIA7NP53ON/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GE43MDCRGS4R7MRRZNVSLREHRLU5OHCV/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-5437-1
| +| libXi | CVE-2016-7945 | MEDIUM | 1.7.9-1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93364
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7945
https://cgit.freedesktop.org/xorg/lib/libXi/commit/?id=19a9cd607de73947fcfb104682f203ffe4e1f4e5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3NTWIWSQ575GREBVAOUQUIMDL5CDVGP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVTZ2XLPKLASQUIQA2GMKKAUOQIUMM7I/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
| +| libXi | CVE-2016-7946 | LOW | 1.7.9-1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93374
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7946
https://cgit.freedesktop.org/xorg/lib/libXi/commit/?id=19a9cd607de73947fcfb104682f203ffe4e1f4e5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3NTWIWSQ575GREBVAOUQUIMDL5CDVGP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVTZ2XLPKLASQUIQA2GMKKAUOQIUMM7I/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
| +| libXrender | CVE-2016-7949 | MEDIUM | 0.9.10-1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93366
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7949
https://cgit.freedesktop.org/xorg/lib/libXrender/commit/?id=9362c7ddd1af3b168953d0737877bc52d79c94f4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WCKZFMZ76APAVMIRCUKKHEB4GAS7ZUP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHUT5YOSWVMBJNWZGUQNZRBFIZKRM4A6/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-5436-1
| +| libXrender | CVE-2016-7950 | MEDIUM | 0.9.10-1.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93369
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7950
https://cgit.freedesktop.org/xorg/lib/libXrender/commit/?id=8fad00b0b647ee662ce4737ca15be033b7a21714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WCKZFMZ76APAVMIRCUKKHEB4GAS7ZUP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHUT5YOSWVMBJNWZGUQNZRBFIZKRM4A6/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-5436-1
| +| libblkid | CVE-2014-9114 | MEDIUM | 2.23.2-61.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
http://www.openwall.com/lists/oss-security/2014/11/26/13
http://www.openwall.com/lists/oss-security/2014/11/26/21
http://www.securityfocus.com/bid/71327
https://access.redhat.com/security/cve/CVE-2014-9114
https://bugzilla.redhat.com/show_bug.cgi?id=1168485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114
https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201612-14
| +| libblkid | CVE-2016-2779 | MEDIUM | 2.23.2-61.el7 | |
Expand...http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
| +| libblkid | CVE-2022-0563 | MEDIUM | 2.23.2-61.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libblkid | CVE-2015-5218 | LOW | 2.23.2-61.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
http://www.spinics.net/lists/util-linux-ng/msg11873.html
https://access.redhat.com/security/cve/CVE-2015-5218
https://bugzilla.redhat.com/show_bug.cgi?id=1259322
https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
| +| libblkid | CVE-2021-37600 | LOW | 2.23.2-61.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libcom_err | CVE-2015-0247 | MEDIUM | 1.42.9-17.el7 | |
Expand...http://advisories.mageia.org/MGASA-2015-0061.html
http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:045
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.ocert.org/advisories/ocert-2015-002.html
http://www.securityfocus.com/archive/1/534633/100/0/threaded
http://www.securityfocus.com/bid/72520
http://www.ubuntu.com/usn/USN-2507-1
https://access.redhat.com/security/cve/CVE-2015-0247
https://bugzilla.redhat.com/show_bug.cgi?id=1187032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247
https://exchange.xforce.ibmcloud.com/vulnerabilities/100740
https://security.gentoo.org/glsa/201701-06
https://ubuntu.com/security/notices/USN-2507-1
| +| libcom_err | CVE-2019-5094 | MEDIUM | 1.42.9-17.el7 | 1.42.9-19.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-5094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094
https://linux.oracle.com/cve/CVE-2019-5094.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5094
https://seclists.org/bugtraq/2019/Sep/58
https://security.gentoo.org/glsa/202003-05
https://security.netapp.com/advisory/ntap-20200115-0002/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887
https://ubuntu.com/security/notices/USN-4142-1
https://ubuntu.com/security/notices/USN-4142-2
https://usn.ubuntu.com/4142-1/
https://usn.ubuntu.com/4142-2/
https://www.debian.org/security/2019/dsa-4535
| +| libcom_err | CVE-2019-5188 | MEDIUM | 1.42.9-17.el7 | 1.42.9-19.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-5188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188
https://linux.oracle.com/cve/CVE-2019-5188.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5188
https://security.netapp.com/advisory/ntap-20220506-0001/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973
https://ubuntu.com/security/notices/USN-4249-1
https://usn.ubuntu.com/4249-1/
| +| libcom_err | CVE-2022-1304 | MEDIUM | 1.42.9-17.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libcom_err | CVE-2015-1572 | LOW | 1.42.9-17.el7 | |
Expand...http://advisories.mageia.org/MGASA-2015-0088.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.mandriva.com/security/advisories?name=MDVSA-2015:068
http://www.securityfocus.com/bid/72709
http://www.ubuntu.com/usn/USN-2507-1
https://access.redhat.com/security/cve/CVE-2015-1572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572
https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73
https://security.gentoo.org/glsa/201507-22
https://ubuntu.com/security/notices/USN-2507-1
| +| libcom_err-devel | CVE-2015-0247 | MEDIUM | 1.42.9-17.el7 | |
Expand...http://advisories.mageia.org/MGASA-2015-0061.html
http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:045
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.ocert.org/advisories/ocert-2015-002.html
http://www.securityfocus.com/archive/1/534633/100/0/threaded
http://www.securityfocus.com/bid/72520
http://www.ubuntu.com/usn/USN-2507-1
https://access.redhat.com/security/cve/CVE-2015-0247
https://bugzilla.redhat.com/show_bug.cgi?id=1187032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247
https://exchange.xforce.ibmcloud.com/vulnerabilities/100740
https://security.gentoo.org/glsa/201701-06
https://ubuntu.com/security/notices/USN-2507-1
| +| libcom_err-devel | CVE-2019-5094 | MEDIUM | 1.42.9-17.el7 | 1.42.9-19.el7 |
Expand...https://access.redhat.com/security/cve/CVE-2019-5094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094
https://linux.oracle.com/cve/CVE-2019-5094.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5094
https://seclists.org/bugtraq/2019/Sep/58
https://security.gentoo.org/glsa/202003-05
https://security.netapp.com/advisory/ntap-20200115-0002/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887
https://ubuntu.com/security/notices/USN-4142-1
https://ubuntu.com/security/notices/USN-4142-2
https://usn.ubuntu.com/4142-1/
https://usn.ubuntu.com/4142-2/
https://www.debian.org/security/2019/dsa-4535
| +| libcom_err-devel | CVE-2019-5188 | MEDIUM | 1.42.9-17.el7 | 1.42.9-19.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-5188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188
https://linux.oracle.com/cve/CVE-2019-5188.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5188
https://security.netapp.com/advisory/ntap-20220506-0001/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973
https://ubuntu.com/security/notices/USN-4249-1
https://usn.ubuntu.com/4249-1/
| +| libcom_err-devel | CVE-2022-1304 | MEDIUM | 1.42.9-17.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libcom_err-devel | CVE-2015-1572 | LOW | 1.42.9-17.el7 | |
Expand...http://advisories.mageia.org/MGASA-2015-0088.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.mandriva.com/security/advisories?name=MDVSA-2015:068
http://www.securityfocus.com/bid/72709
http://www.ubuntu.com/usn/USN-2507-1
https://access.redhat.com/security/cve/CVE-2015-1572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572
https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73
https://security.gentoo.org/glsa/201507-22
https://ubuntu.com/security/notices/USN-2507-1
| +| libcurl | CVE-2015-3153 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://curl.haxx.se/docs/adv_20150429.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html
http://www.debian.org/security/2015/dsa-3240
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
http://www.securityfocus.com/bid/74408
http://www.securitytracker.com/id/1032233
http://www.ubuntu.com/usn/USN-2591-1
https://access.redhat.com/security/cve/CVE-2015-3153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153
https://kc.mcafee.com/corporate/index?page=content&id=SB10131
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2591-1
| +| libcurl | CVE-2016-8615 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94096
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8615
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615
https://curl.haxx.se/CVE-2016-8615.patch
https://curl.haxx.se/docs/adv_20161102A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
https://linux.oracle.com/cve/CVE-2016-8615.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| libcurl | CVE-2016-8617 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94097
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8617
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617
https://curl.haxx.se/CVE-2016-8617.patch
https://curl.haxx.se/docs/adv_20161102C.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
https://linux.oracle.com/cve/CVE-2016-8617.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| libcurl | CVE-2016-8618 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94098
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8618
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618
https://curl.haxx.se/docs/adv_20161102D.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
https://linux.oracle.com/cve/CVE-2016-8618.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| libcurl | CVE-2016-8619 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94100
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8619
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619
https://curl.haxx.se/CVE-2016-8619.patch
https://curl.haxx.se/docs/adv_20161102E.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
https://linux.oracle.com/cve/CVE-2016-8619.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| libcurl | CVE-2016-8624 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94103
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8624
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624
https://curl.haxx.se/docs/adv_20161102J.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
https://linux.oracle.com/cve/CVE-2016-8624.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| libcurl | CVE-2016-8625 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.securityfocus.com/bid/94107
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8625
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625
https://curl.haxx.se/CVE-2016-8625.patch
https://curl.haxx.se/docs/adv_20161102K.html
https://linux.oracle.com/cve/CVE-2016-8625.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://www.tenable.com/security/tns-2016-21
| +| libcurl | CVE-2017-1000254 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/101115
http://www.securitytracker.com/id/1039509
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000254
https://curl.haxx.se/673d0cd8.patch
https://curl.haxx.se/docs/adv_20171004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201712-04
https://support.apple.com/HT208331
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
| +| libcurl | CVE-2017-8817 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=162
http://www.securityfocus.com/bid/102057
http://www.securitytracker.com/id/1039897
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-8817
https://curl.haxx.se/docs/adv_2017-ae72.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
https://security.gentoo.org/glsa/201712-04
https://ubuntu.com/security/notices/USN-3498-1
https://ubuntu.com/security/notices/USN-3498-2
https://www.debian.org/security/2017/dsa-4051
| +| libcurl | CVE-2019-5482 | MEDIUM | 7.29.0-54.el7 | 7.29.0-59.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html
https://access.redhat.com/security/cve/CVE-2019-5482
https://curl.haxx.se/docs/CVE-2019-5482.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
https://linux.oracle.com/cve/CVE-2019-5482.html
https://linux.oracle.com/errata/ELSA-2020-5562.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/
https://seclists.org/bugtraq/2020/Feb/36
https://security.gentoo.org/glsa/202003-29
https://security.netapp.com/advisory/ntap-20191004-0003/
https://security.netapp.com/advisory/ntap-20200416-0003/
https://ubuntu.com/security/notices/USN-4129-1
https://ubuntu.com/security/notices/USN-4129-2
https://www.debian.org/security/2020/dsa-4633
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libcurl | CVE-2020-8177 | MEDIUM | 7.29.0-54.el7 | 7.29.0-59.el7_9.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-8177
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.haxx.se/docs/CVE-2020-8177.html
https://curl.se/docs/CVE-2020-8177.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
https://hackerone.com/reports/887462
https://linux.oracle.com/cve/CVE-2020-8177.html
https://linux.oracle.com/errata/ELSA-2020-5002.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8177
https://ubuntu.com/security/notices/USN-4402-1
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl | CVE-2020-8284 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-8284
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2020-8284.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
https://hackerone.com/reports/1040166
https://linux.oracle.com/cve/CVE-2020-8284.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://nvd.nist.gov/vuln/detail/CVE-2020-8284
https://security.gentoo.org/glsa/202012-14
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
https://ubuntu.com/security/notices/USN-4665-1
https://ubuntu.com/security/notices/USN-4665-2
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl | CVE-2020-8285 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://seclists.org/fulldisclosure/2021/Apr/51
https://access.redhat.com/security/cve/CVE-2020-8285
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2020-8285.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
https://github.com/curl/curl/issues/6255
https://hackerone.com/reports/1045844
https://linux.oracle.com/cve/CVE-2020-8285.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://nvd.nist.gov/vuln/detail/CVE-2020-8285
https://security.gentoo.org/glsa/202012-14
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
https://ubuntu.com/security/notices/USN-4665-1
https://ubuntu.com/security/notices/USN-4665-2
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl | CVE-2021-22876 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22876
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22876.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1101882
https://linux.oracle.com/cve/CVE-2021-22876.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
https://security.gentoo.org/glsa/202105-36
https://security.netapp.com/advisory/ntap-20210521-0007/
https://ubuntu.com/security/notices/USN-4898-1
https://ubuntu.com/security/notices/USN-4903-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl | CVE-2021-22924 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl | CVE-2021-22946 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl | CVE-2021-22947 | MEDIUM | 7.29.0-54.el7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27778 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27778
| +| libcurl | CVE-2022-27779 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27779
| +| libcurl | CVE-2022-27780 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27780
https://curl.se/docs/CVE-2022-27780.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl | CVE-2022-27782 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl | CVE-2022-30115 | MEDIUM | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-30115
| +| libcurl | CVE-2016-0755 | LOW | 7.29.0-54.el7 | |
Expand...http://curl.haxx.se/docs/adv_20160127A.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
http://www.debian.org/security/2016/dsa-3455
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/82307
http://www.securitytracker.com/id/1034882
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
http://www.ubuntu.com/usn/USN-2882-1
https://access.redhat.com/security/cve/CVE-2016-0755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
https://security.gentoo.org/glsa/201701-47
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-2882-1
| +| libcurl | CVE-2016-8616 | LOW | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94094
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8616
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616
https://curl.haxx.se/CVE-2016-8616.patch
https://curl.haxx.se/docs/adv_20161102B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
https://linux.oracle.com/cve/CVE-2016-8616.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| libcurl | CVE-2016-8621 | LOW | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94101
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8621
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621
https://curl.haxx.se/CVE-2016-8621.patch
https://curl.haxx.se/docs/adv_20161102G.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
https://linux.oracle.com/cve/CVE-2016-8621.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| libcurl | CVE-2016-8622 | LOW | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94105
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8622
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622
https://curl.haxx.se/docs/adv_20161102H.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
https://linux.oracle.com/cve/CVE-2016-8622.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| libcurl | CVE-2016-8623 | LOW | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94106
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623
https://curl.haxx.se/CVE-2016-8623.patch
https://curl.haxx.se/docs/adv_20161102I.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
https://linux.oracle.com/cve/CVE-2016-8623.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
| +| libcurl | CVE-2016-9586 | LOW | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/95019
http://www.securitytracker.com/id/1037515
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-9586
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
https://curl.haxx.se/docs/adv_20161221A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
| +| libcurl | CVE-2017-1000100 | LOW | 7.29.0-54.el7 | |
Expand...http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/100286
http://www.securitytracker.com/id/1039118
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000100
https://curl.haxx.se/docs/adv_20170809B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
https://security.gentoo.org/glsa/201709-14
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
| +| libcurl | CVE-2017-7407 | LOW | 7.29.0-54.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-7407
https://curl.haxx.se/docs/adv_20170403.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
https://security.gentoo.org/glsa/201709-14
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
| +| libcurl | CVE-2018-20483 | LOW | 7.29.0-54.el7 | |
Expand...http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS
http://www.securityfocus.com/bid/106358
https://access.redhat.com/errata/RHSA-2019:3701
https://access.redhat.com/security/cve/CVE-2018-20483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483
https://linux.oracle.com/cve/CVE-2018-20483.html
https://linux.oracle.com/errata/ELSA-2019-3701.html
https://security.gentoo.org/glsa/201903-08
https://security.netapp.com/advisory/ntap-20190321-0002/
https://twitter.com/marcan42/status/1077676739877232640
https://ubuntu.com/security/notices/USN-3943-1
https://usn.ubuntu.com/3943-1/
| +| libcurl | CVE-2019-5436 | LOW | 7.29.0-54.el7 | 7.29.0-57.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html
http://www.openwall.com/lists/oss-security/2019/09/11/6
https://access.redhat.com/security/cve/CVE-2019-5436
https://curl.haxx.se/docs/CVE-2019-5436.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436
https://linux.oracle.com/cve/CVE-2019-5436.html
https://linux.oracle.com/errata/ELSA-2020-1792.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/
https://seclists.org/bugtraq/2020/Feb/36
https://security.gentoo.org/glsa/202003-29
https://security.netapp.com/advisory/ntap-20190606-0004/
https://support.f5.com/csp/article/K55133295
https://support.f5.com/csp/article/K55133295?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3993-1
https://ubuntu.com/security/notices/USN-3993-2
https://www.debian.org/security/2020/dsa-4633
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| libcurl | CVE-2020-8231 | LOW | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-8231
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.haxx.se/docs/CVE-2020-8231.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
https://hackerone.com/reports/948876
https://linux.oracle.com/cve/CVE-2020-8231.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-8231
https://security.gentoo.org/glsa/202012-14
https://ubuntu.com/security/notices/USN-4466-1
https://ubuntu.com/security/notices/USN-4466-2
https://ubuntu.com/security/notices/USN-4665-1
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libcurl | CVE-2021-22898 | LOW | 7.29.0-54.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl | CVE-2021-22925 | LOW | 7.29.0-54.el7 | |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
https://access.redhat.com/security/cve/CVE-2021-22925
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22925
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl | CVE-2022-27781 | LOW | 7.29.0-54.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| libdb | CVE-2017-10140 | MEDIUM | 5.3.21-25.el7 | |
Expand...http://seclists.org/oss-sec/2017/q3/285
http://www.openwall.com/lists/oss-security/2017/08/12/1
http://www.postfix.org/announcements/postfix-3.2.2.html
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/security/cve/CVE-2017-10140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10140
https://ubuntu.com/security/notices/USN-3489-1
https://ubuntu.com/security/notices/USN-3489-2
https://www.oracle.com/security-alerts/cpujul2020.html
| +| libdb | CVE-2019-2708 | LOW | 5.3.21-25.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://access.redhat.com/security/cve/CVE-2019-2708
https://linux.oracle.com/cve/CVE-2019-2708.html
https://linux.oracle.com/errata/ELSA-2021-1675.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQFKX6NKU2DCW5CTCHQSOJJDFVRVTPO6/
https://nvd.nist.gov/vuln/detail/CVE-2019-2708
| +| libdb-utils | CVE-2017-10140 | MEDIUM | 5.3.21-25.el7 | |
Expand...http://seclists.org/oss-sec/2017/q3/285
http://www.openwall.com/lists/oss-security/2017/08/12/1
http://www.postfix.org/announcements/postfix-3.2.2.html
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/security/cve/CVE-2017-10140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10140
https://ubuntu.com/security/notices/USN-3489-1
https://ubuntu.com/security/notices/USN-3489-2
https://www.oracle.com/security-alerts/cpujul2020.html
| +| libdb-utils | CVE-2019-2708 | LOW | 5.3.21-25.el7 | |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://access.redhat.com/security/cve/CVE-2019-2708
https://linux.oracle.com/cve/CVE-2019-2708.html
https://linux.oracle.com/errata/ELSA-2021-1675.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQFKX6NKU2DCW5CTCHQSOJJDFVRVTPO6/
https://nvd.nist.gov/vuln/detail/CVE-2019-2708
| +| libgcc | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
| +| libgcc | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libgcc | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
| +| libgcc | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| libgcc | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
| +| libgcc | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
| +| libgcc | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| libgcc | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| libgcc | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
| +| libgcc | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
| +| libgcc | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
| +| libgcc | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
| +| libgcc | CVE-2015-5276 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
| +| libgcc | CVE-2016-2226 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
| +| libgcc | CVE-2016-4487 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgcc | CVE-2016-4488 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgcc | CVE-2016-4489 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgcc | CVE-2016-4490 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgcc | CVE-2016-4491 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgcc | CVE-2016-4492 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgcc | CVE-2016-4493 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgcc | CVE-2018-20657 | LOW | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| libgcc | CVE-2019-14250 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libgcc | CVE-2021-46195 | LOW | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| libgcrypt | CVE-2014-5270 | MEDIUM | 1.5.3-14.el7 | |
Expand...http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html
http://openwall.com/lists/oss-security/2014/08/16/2
http://www.cs.tau.ac.il/~tromer/handsoff/
http://www.debian.org/security/2014/dsa-3024
http://www.debian.org/security/2014/dsa-3073
https://access.redhat.com/security/cve/CVE-2014-5270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270
https://ubuntu.com/security/notices/USN-2339-1
https://ubuntu.com/security/notices/USN-2339-2
| +| libgcrypt | CVE-2017-7526 | MEDIUM | 1.5.3-14.el7 | |
Expand...http://www.securityfocus.com/bid/99338
http://www.securitytracker.com/id/1038915
https://access.redhat.com/security/cve/CVE-2017-7526
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526
https://eprint.iacr.org/2017/627
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=78130828e9a140a9de4dafadbc844dbb64cb709a
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=e6a3dc9900433bbc8ad362a595a3837318c28fa9
https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html
https://ubuntu.com/security/notices/USN-3347-1
https://ubuntu.com/security/notices/USN-3347-2
https://ubuntu.com/security/notices/USN-3733-1
https://ubuntu.com/security/notices/USN-3733-2
https://usn.ubuntu.com/3733-1/
https://usn.ubuntu.com/3733-2/
https://www.debian.org/security/2017/dsa-3901
https://www.debian.org/security/2017/dsa-3960
| +| libgcrypt | CVE-2019-12904 | MEDIUM | 1.5.3-14.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2019-12904
https://dev.gnupg.org/T4541
https://github.com/gpg/libgcrypt/commit/a4c561aab1014c3630bc88faf6f5246fee16b020
https://github.com/gpg/libgcrypt/commit/daedbbb5541cd8ecda1459d3b843ea4d92788762
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12904.html
| +| libgcrypt | CVE-2021-33560 | MEDIUM | 1.5.3-14.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt | CVE-2021-40528 | MEDIUM | 1.5.3-14.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-40528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528
https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13
https://eprint.iacr.org/2021/923
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320
https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
https://nvd.nist.gov/vuln/detail/CVE-2021-40528
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
| +| libgcrypt | CVE-2014-3591 | LOW | 1.5.3-14.el7 | |
Expand...http://www.cs.tau.ac.il/~tromer/radioexp/
http://www.debian.org/security/2015/dsa-3184
http://www.debian.org/security/2015/dsa-3185
https://access.redhat.com/security/cve/CVE-2014-3591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
https://ubuntu.com/security/notices/USN-2554-1
https://ubuntu.com/security/notices/USN-2555-1
| +| libgcrypt | CVE-2015-0837 | LOW | 1.5.3-14.el7 | |
Expand...http://www.debian.org/security/2015/dsa-3184
http://www.debian.org/security/2015/dsa-3185
https://access.redhat.com/security/cve/CVE-2015-0837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837
https://ieeexplore.ieee.org/document/7163050
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
https://ubuntu.com/security/notices/USN-2554-1
https://ubuntu.com/security/notices/USN-2555-1
| +| libgfortran | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
| +| libgfortran | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libgfortran | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
| +| libgfortran | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| libgfortran | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
| +| libgfortran | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
| +| libgfortran | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| libgfortran | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| libgfortran | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
| +| libgfortran | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
| +| libgfortran | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
| +| libgfortran | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
| +| libgfortran | CVE-2015-5276 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
| +| libgfortran | CVE-2016-2226 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
| +| libgfortran | CVE-2016-4487 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgfortran | CVE-2016-4488 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgfortran | CVE-2016-4489 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgfortran | CVE-2016-4490 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgfortran | CVE-2016-4491 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgfortran | CVE-2016-4492 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgfortran | CVE-2016-4493 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgfortran | CVE-2018-20657 | LOW | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| libgfortran | CVE-2019-14250 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libgfortran | CVE-2021-46195 | LOW | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| libgomp | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
| +| libgomp | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libgomp | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
| +| libgomp | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| libgomp | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
| +| libgomp | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
| +| libgomp | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| libgomp | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| libgomp | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
| +| libgomp | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
| +| libgomp | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
| +| libgomp | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
| +| libgomp | CVE-2015-5276 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
| +| libgomp | CVE-2016-2226 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
| +| libgomp | CVE-2016-4487 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgomp | CVE-2016-4488 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgomp | CVE-2016-4489 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgomp | CVE-2016-4490 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgomp | CVE-2016-4491 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgomp | CVE-2016-4492 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgomp | CVE-2016-4493 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libgomp | CVE-2018-20657 | LOW | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| libgomp | CVE-2019-14250 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libgomp | CVE-2021-46195 | LOW | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| libidn | CVE-2015-2059 | LOW | 1.28-4.el7 | |
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html
http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3578
http://www.openwall.com/lists/oss-security/2015/02/23/25
http://www.securityfocus.com/bid/72736
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2015-2059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2059
https://github.com/jabberd2/jabberd2/issues/85
https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00026.html (regression)
https://ubuntu.com/security/notices/USN-3068-1
| +| libidn | CVE-2015-8948 | LOW | 1.28-4.el7 | |
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2015-8948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://marc.info/?l=oss-security&m=146910769415616&w=2
https://ubuntu.com/security/notices/USN-3068-1
| +| libidn | CVE-2016-6261 | LOW | 1.28-4.el7 | |
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00016.html
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://ubuntu.com/security/notices/USN-3068-1
| +| libidn | CVE-2016-6262 | LOW | 1.28-4.el7 | |
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://ubuntu.com/security/notices/USN-3068-1
| +| libidn | CVE-2016-6263 | LOW | 1.28-4.el7 | |
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://security.gentoo.org/glsa/201908-06
https://ubuntu.com/security/notices/USN-3068-1
| +| libidn | CVE-2017-14062 | LOW | 1.28-4.el7 | |
Expand...http://www.debian.org/security/2017/dsa-3988
https://access.redhat.com/security/cve/CVE-2017-14062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14062
https://gitlab.com/libidn/libidn2/blob/master/NEWS
https://gitlab.com/libidn/libidn2/commit/3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd
https://lists.debian.org/debian-lts-announce/2018/07/msg00040.html
https://ubuntu.com/security/notices/USN-3421-1
https://ubuntu.com/security/notices/USN-3434-1
https://ubuntu.com/security/notices/USN-3434-2
| +| libkadm5 | CVE-2014-5351 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://advisories.mageia.org/MGASA-2014-0477.html
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html
http://security.gentoo.org/glsa/glsa-201412-53.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2014:224
http://www.securityfocus.com/bid/70380
http://www.securitytracker.com/id/1031003
http://www.ubuntu.com/usn/USN-2498-1
https://access.redhat.com/security/cve/CVE-2014-5351
https://bugzilla.redhat.com/show_bug.cgi?id=1145425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351
https://exchange.xforce.ibmcloud.com/vulnerabilities/97028
https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
https://ubuntu.com/security/notices/USN-2498-1
| +| libkadm5 | CVE-2015-2695 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/90687
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
| +| libkadm5 | CVE-2015-2696 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.securityfocus.com/bid/90675
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
| +| libkadm5 | CVE-2015-2697 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/77581
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
| +| libkadm5 | CVE-2017-15088 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
| +| libkadm5 | CVE-2020-17049 | MEDIUM | 1.15.1-46.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/10/3
https://access.redhat.com/security/cve/CVE-2020-17049
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049
| +| libkadm5 | CVE-2020-28196 | MEDIUM | 1.15.1-46.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196
https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
https://linux.oracle.com/cve/CVE-2020-28196.html
https://linux.oracle.com/errata/ELSA-2021-9294.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
https://nvd.nist.gov/vuln/detail/CVE-2020-28196
https://security.gentoo.org/glsa/202011-17
https://security.netapp.com/advisory/ntap-20201202-0001/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4635-1
https://www.debian.org/security/2020/dsa-4795
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libkadm5 | CVE-2021-36222 | MEDIUM | 1.15.1-46.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkadm5 | CVE-2021-37750 | MEDIUM | 1.15.1-46.el7 | 1.15.1-51.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libkadm5 | CVE-2017-11462 | LOW | 1.15.1-46.el7 | |
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
| +| libmount | CVE-2014-9114 | MEDIUM | 2.23.2-61.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
http://www.openwall.com/lists/oss-security/2014/11/26/13
http://www.openwall.com/lists/oss-security/2014/11/26/21
http://www.securityfocus.com/bid/71327
https://access.redhat.com/security/cve/CVE-2014-9114
https://bugzilla.redhat.com/show_bug.cgi?id=1168485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114
https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201612-14
| +| libmount | CVE-2016-2779 | MEDIUM | 2.23.2-61.el7 | |
Expand...http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
| +| libmount | CVE-2022-0563 | MEDIUM | 2.23.2-61.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libmount | CVE-2015-5218 | LOW | 2.23.2-61.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
http://www.spinics.net/lists/util-linux-ng/msg11873.html
https://access.redhat.com/security/cve/CVE-2015-5218
https://bugzilla.redhat.com/show_bug.cgi?id=1259322
https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
| +| libmount | CVE-2021-37600 | LOW | 2.23.2-61.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libpng | CVE-2015-8540 | LOW | 2:1.5.13-8.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174435.html
http://sourceforge.net/p/libpng/bugs/244/
http://sourceforge.net/p/libpng/code/ci/d9006f683c641793252d92254a75ae9b815b42ed/
http://sourceforge.net/projects/libpng/files/libpng10/1.0.66/
http://sourceforge.net/projects/libpng/files/libpng12/1.2.56/
http://sourceforge.net/projects/libpng/files/libpng14/1.4.19/
http://sourceforge.net/projects/libpng/files/libpng15/1.5.26/
http://www.debian.org/security/2016/dsa-3443
http://www.openwall.com/lists/oss-security/2015/12/10/6
http://www.openwall.com/lists/oss-security/2015/12/10/7
http://www.openwall.com/lists/oss-security/2015/12/11/1
http://www.openwall.com/lists/oss-security/2015/12/11/2
http://www.openwall.com/lists/oss-security/2015/12/17/10
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/80592
https://access.redhat.com/errata/RHSA-2016:1430
https://access.redhat.com/security/cve/CVE-2015-8540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201611-08
https://ubuntu.com/security/notices/USN-2861-1
| +| libpng | CVE-2016-10087 | LOW | 2:1.5.13-8.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/12/29/2
http://www.openwall.com/lists/oss-security/2016/12/30/4
http://www.securityfocus.com/bid/95157
https://access.redhat.com/security/cve/CVE-2016-10087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-74
https://sourceforge.net/p/libpng/code/ci/243d4e5f3fe71740d52a53cf3dd77cc83a3430ba
https://sourceforge.net/p/libpng/code/ci/794a15fad6add4d636369d0b46f603a02995b2e2/ (libpng12)
https://sourceforge.net/p/libpng/code/ci/812768d7a9c973452222d454634496b25ed415eb (libpng16)
https://ubuntu.com/security/notices/USN-3712-1
https://ubuntu.com/security/notices/USN-3712-2
https://usn.ubuntu.com/3712-1/
https://usn.ubuntu.com/3712-2/
| +| libquadmath | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
| +| libquadmath | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libquadmath | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
| +| libquadmath | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| libquadmath | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
| +| libquadmath | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
| +| libquadmath | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| libquadmath | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| libquadmath | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
| +| libquadmath | CVE-2021-3114 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114
https://github.com/golang/go/commit/d95ca9138026cbe40e0857d76a81a16d03230871
https://groups.google.com/g/golang-announce/c/mperVMGa98w
https://linux.oracle.com/cve/CVE-2021-3114.html
https://linux.oracle.com/errata/ELSA-2021-4226.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWAYJGXWC232SG3UR3TR574E6BP3OSQQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-3114
https://security.netapp.com/advisory/ntap-20210219-0001/
https://www.debian.org/security/2021/dsa-4848
| +| libquadmath | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
| +| libquadmath | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
| +| libquadmath | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
| +| libquadmath | CVE-2015-5276 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
| +| libquadmath | CVE-2016-2226 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
| +| libquadmath | CVE-2016-4487 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libquadmath | CVE-2016-4488 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libquadmath | CVE-2016-4489 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libquadmath | CVE-2016-4490 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libquadmath | CVE-2016-4491 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libquadmath | CVE-2016-4492 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libquadmath | CVE-2016-4493 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libquadmath | CVE-2018-20657 | LOW | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| libquadmath | CVE-2019-14250 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libquadmath | CVE-2021-46195 | LOW | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| libsepol | CVE-2021-36084 | MEDIUM | 2.5-10.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol | CVE-2021-36085 | MEDIUM | 2.5-10.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol | CVE-2021-36086 | MEDIUM | 2.5-10.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol | CVE-2021-36087 | MEDIUM | 2.5-10.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol-devel | CVE-2021-36084 | MEDIUM | 2.5-10.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol-devel | CVE-2021-36085 | MEDIUM | 2.5-10.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol-devel | CVE-2021-36086 | MEDIUM | 2.5-10.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol-devel | CVE-2021-36087 | MEDIUM | 2.5-10.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libssh2 | CVE-2019-13115 | MEDIUM | 1.8.0-3.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&utm_medium=RSS
| +| libssh2 | CVE-2019-17498 | MEDIUM | 1.8.0-3.el7 | 1.8.0-4.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://access.redhat.com/security/cve/CVE-2019-17498
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
https://nvd.nist.gov/vuln/detail/CVE-2019-17498
| +| libssh2 | CVE-2019-3859 | MEDIUM | 1.8.0-3.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html
http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html
http://www.openwall.com/lists/oss-security/2019/03/18/3
http://www.securityfocus.com/bid/107485
https://access.redhat.com/security/cve/CVE-2019-3859
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3859
https://github.com/libssh2/libssh2/pull/315
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00006.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/
https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html
https://seclists.org/bugtraq/2019/Apr/25
https://seclists.org/bugtraq/2019/Mar/25
https://security.netapp.com/advisory/ntap-20190327-0005/
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767
https://www.debian.org/security/2019/dsa-4431
https://www.libssh2.org/CVE-2019-3859.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| libssh2 | CVE-2019-3860 | MEDIUM | 1.8.0-3.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html
https://access.redhat.com/security/cve/CVE-2019-3860
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3860
https://github.com/libssh2/libssh2/pull/316
https://libssh2.org/CVE-2019-3860.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00028.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
https://seclists.org/bugtraq/2019/Apr/25
https://security.netapp.com/advisory/ntap-20190327-0005/
https://www.debian.org/security/2019/dsa-4431
https://www.libssh2.org/CVE-2019-3860.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| libstdc++ | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
| +| libstdc++ | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libstdc++ | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
| +| libstdc++ | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| libstdc++ | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
| +| libstdc++ | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
| +| libstdc++ | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| libstdc++ | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| libstdc++ | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
| +| libstdc++ | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
| +| libstdc++ | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
| +| libstdc++ | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
| +| libstdc++ | CVE-2015-5276 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
| +| libstdc++ | CVE-2016-2226 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
| +| libstdc++ | CVE-2016-4487 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++ | CVE-2016-4488 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++ | CVE-2016-4489 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++ | CVE-2016-4490 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++ | CVE-2016-4491 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++ | CVE-2016-4492 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++ | CVE-2016-4493 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++ | CVE-2018-20657 | LOW | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| libstdc++ | CVE-2019-14250 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libstdc++ | CVE-2021-46195 | LOW | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| libstdc++-devel | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
| +| libstdc++-devel | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libstdc++-devel | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
| +| libstdc++-devel | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| libstdc++-devel | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
| +| libstdc++-devel | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
| +| libstdc++-devel | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| libstdc++-devel | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
| +| libstdc++-devel | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
| +| libstdc++-devel | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
| +| libstdc++-devel | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
| +| libstdc++-devel | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
| +| libstdc++-devel | CVE-2015-5276 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
| +| libstdc++-devel | CVE-2016-2226 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
| +| libstdc++-devel | CVE-2016-4487 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++-devel | CVE-2016-4488 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++-devel | CVE-2016-4489 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++-devel | CVE-2016-4490 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++-devel | CVE-2016-4491 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++-devel | CVE-2016-4492 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++-devel | CVE-2016-4493 | LOW | 4.8.5-39.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
| +| libstdc++-devel | CVE-2018-20657 | LOW | 4.8.5-39.el7 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| libstdc++-devel | CVE-2019-14250 | LOW | 4.8.5-39.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libstdc++-devel | CVE-2021-46195 | LOW | 4.8.5-39.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| libtasn1 | CVE-2016-4008 | MEDIUM | 4.10-1.el7 | |
Expand...http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html
http://www.debian.org/security/2016/dsa-3568
http://www.openwall.com/lists/oss-security/2016/04/11/3
http://www.ubuntu.com/usn/USN-2957-1
http://www.ubuntu.com/usn/USN-2957-2
https://access.redhat.com/security/cve/CVE-2016-4008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008
https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html
https://security.gentoo.org/glsa/201703-05
https://ubuntu.com/security/notices/USN-2957-1
https://ubuntu.com/security/notices/USN-2957-2
| +| libtasn1 | CVE-2018-6003 | MEDIUM | 4.10-1.el7 | |
Expand...http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97
https://access.redhat.com/security/cve/CVE-2018-6003
https://bugzilla.redhat.com/show_bug.cgi?id=1535926
https://bugzilla.suse.com/show_bug.cgi?id=1076832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6003
https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3547-1
https://www.debian.org/security/2018/dsa-4106
| +| libtasn1 | CVE-2017-10790 | LOW | 4.10-1.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-10790
https://bugzilla.redhat.com/show_bug.cgi?id=1464141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html
https://security.gentoo.org/glsa/201710-11
https://ubuntu.com/security/notices/USN-3547-1
https://usn.ubuntu.com/3547-1/
https://www.debian.org/security/2018/dsa-4106
| +| libtasn1 | CVE-2017-6891 | LOW | 4.10-1.el7 | |
Expand...http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.debian.org/security/2017/dsa-3861
http://www.securityfocus.com/bid/98641
http://www.securitytracker.com/id/1038619
https://access.redhat.com/security/cve/CVE-2017-6891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6891
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://secuniaresearch.flexerasoftware.com/advisories/76125/
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/
https://security.gentoo.org/glsa/201710-11
https://ubuntu.com/security/notices/USN-3309-1
https://ubuntu.com/security/notices/USN-3309-2
| +| libtasn1 | CVE-2018-1000654 | LOW | 4.10-1.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
| +| libuuid | CVE-2014-9114 | MEDIUM | 2.23.2-61.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
http://www.openwall.com/lists/oss-security/2014/11/26/13
http://www.openwall.com/lists/oss-security/2014/11/26/21
http://www.securityfocus.com/bid/71327
https://access.redhat.com/security/cve/CVE-2014-9114
https://bugzilla.redhat.com/show_bug.cgi?id=1168485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114
https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201612-14
| +| libuuid | CVE-2016-2779 | MEDIUM | 2.23.2-61.el7 | |
Expand...http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
| +| libuuid | CVE-2022-0563 | MEDIUM | 2.23.2-61.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libuuid | CVE-2015-5218 | LOW | 2.23.2-61.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
http://www.spinics.net/lists/util-linux-ng/msg11873.html
https://access.redhat.com/security/cve/CVE-2015-5218
https://bugzilla.redhat.com/show_bug.cgi?id=1259322
https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
| +| libuuid | CVE-2021-37600 | LOW | 2.23.2-61.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2015-8035 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 |
Expand...http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177341.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177381.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://www.debian.org/security/2015/dsa-3430
http://www.openwall.com/lists/oss-security/2015/11/02/2
http://www.openwall.com/lists/oss-security/2015/11/02/4
http://www.openwall.com/lists/oss-security/2015/11/03/1
http://www.securityfocus.com/bid/77390
http://www.securitytracker.com/id/1034243
http://www.ubuntu.com/usn/USN-2812-1
http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2015-8035
https://bugzilla.gnome.org/show_bug.cgi?id=757466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://linux.oracle.com/cve/CVE-2015-8035.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://security.gentoo.org/glsa/201701-37
https://support.apple.com/HT206166
https://support.apple.com/HT206167
https://support.apple.com/HT206168
https://support.apple.com/HT206169
https://ubuntu.com/security/notices/USN-2812-1
| +| libxml2 | CVE-2016-4483 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.debian.org/security/2016/dsa-3593
http://www.openwall.com/lists/oss-security/2016/05/03/8
http://www.openwall.com/lists/oss-security/2016/05/04/7
http://www.openwall.com/lists/oss-security/2016/06/07/4
http://www.openwall.com/lists/oss-security/2016/06/07/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/90013
http://www.securitytracker.com/id/1036348
https://access.redhat.com/security/cve/CVE-2016-4483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483
https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-37
https://ubuntu.com/security/notices/USN-2994-1
https://www.tenable.com/security/tns-2016-18
| +| libxml2 | CVE-2016-4658 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7_9.6 |
Expand...http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
http://www.securityfocus.com/bid/93054
http://www.securitytracker.com/id/1036858
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2016-4658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658
https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b
https://github.com/advisories/GHSA-fr52-4hqw-p27f
https://github.com/sparklemotion/nokogiri/issues/1615
https://linux.oracle.com/cve/CVE-2016-4658.html
https://linux.oracle.com/errata/ELSA-2021-3810.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4658
https://security.gentoo.org/glsa/201701-37
https://support.apple.com/HT207141
https://support.apple.com/HT207142
https://support.apple.com/HT207143
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3235-1
| +| libxml2 | CVE-2016-5131 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 |
Expand...http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1485.html
http://www.debian.org/security/2016/dsa-3637
http://www.securityfocus.com/bid/92053
http://www.securitytracker.com/id/1036428
http://www.securitytracker.com/id/1038623
http://www.ubuntu.com/usn/USN-3041-1
https://access.redhat.com/security/cve/CVE-2016-5131
https://bugzilla.redhat.com/show_bug.cgi?id=1358641
https://codereview.chromium.org/2127493002
https://crbug.com/623378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131
https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
https://linux.oracle.com/cve/CVE-2016-5131.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://security.gentoo.org/glsa/201610-09
https://security.gentoo.org/glsa/201701-37
https://source.android.com/security/bulletin/2017-05-01
https://support.apple.com/HT207141
https://support.apple.com/HT207142
https://support.apple.com/HT207143
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3041-1
https://ubuntu.com/security/notices/USN-3235-1
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxml2 | CVE-2017-0663 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.securityfocus.com/bid/98877
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2017-0663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0663
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://source.android.com/security/bulletin/2017-06-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
| +| libxml2 | CVE-2017-15412 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 |
Expand...http://www.securitytracker.com/id/1040348
https://access.redhat.com/errata/RHSA-2017:3401
https://access.redhat.com/errata/RHSA-2018:0287
https://access.redhat.com/security/cve/CVE-2017-15412
https://bugzilla.gnome.org/show_bug.cgi?id=783160
https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
https://crbug.com/727039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412
https://github.com/sparklemotion/nokogiri/issues/1714
https://linux.oracle.com/cve/CVE-2017-15412.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00014.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-15412.html
https://security.gentoo.org/glsa/201801-03
https://ubuntu.com/security/notices/USN-3513-1
https://ubuntu.com/security/notices/USN-3513-2
https://usn.ubuntu.com/usn/usn-3513-1/
https://www.debian.org/security/2018/dsa-4086
| +| libxml2 | CVE-2017-16931 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16931
https://bugzilla.gnome.org/show_bug.cgi?id=766956
https://github.com/GNOME/libxml2/commit/e26630548e7d138d2c560844c43820b6767251e3
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
| +| libxml2 | CVE-2017-16932 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2017-7375 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://www.securityfocus.com/bid/98877
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2017-7375
https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa
https://bugzilla.redhat.com/show_bug.cgi?id=1462203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7375
https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e
https://security.gentoo.org/glsa/201711-01
https://source.android.com/security/bulletin/2017-06-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://www.debian.org/security/2017/dsa-3952
| +| libxml2 | CVE-2017-9047 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98599
https://access.redhat.com/security/cve/CVE-2017-9047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
| +| libxml2 | CVE-2017-9049 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98601
https://access.redhat.com/security/cve/CVE-2017-9049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
| +| libxml2 | CVE-2017-9050 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98568
https://access.redhat.com/security/cve/CVE-2017-9050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050
https://github.com/advisories/GHSA-8c56-cpmw-89x7
https://github.com/sparklemotion/nokogiri/issues/1673
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-9050
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-0663.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7375.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7376.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9047.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9048.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9049.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9050.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://usn.ubuntu.com/usn/usn-3424-1/
| +| libxml2 | CVE-2018-14404 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 |
Expand...https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/security/cve/CVE-2018-14404
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817
https://bugzilla.redhat.com/show_bug.cgi?id=1595985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404
https://github.com/advisories/GHSA-6qvp-r6r3-9p7h
https://github.com/sparklemotion/nokogiri/issues/1785
https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594
https://gitlab.gnome.org/GNOME/libxml2/issues/10
https://groups.google.com/forum/#!msg/ruby-security-ann/uVrmO2HjqQw/Fw3ocLI0BQAJ
https://linux.oracle.com/cve/CVE-2018-14404.html
https://linux.oracle.com/errata/ELSA-2020-1827.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2018-14404
https://security.netapp.com/advisory/ntap-20190719-0002/
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxml2 | CVE-2019-19956 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00005.html
https://access.redhat.com/security/cve/CVE-2019-19956
https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19956
https://gitlab.gnome.org/GNOME/libxml2/commit/5a02583c7e683896d84878bd90641d8d9b0d0549
https://linux.oracle.com/cve/CVE-2019-19956.html
https://linux.oracle.com/errata/ELSA-2020-4479.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://security.netapp.com/advisory/ntap-20200114-0002/
https://ubuntu.com/security/notices/USN-4274-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
https://usn.ubuntu.com/4274-1/
https://www.oracle.com/security-alerts/cpujul2020.html
| +| libxml2 | CVE-2019-20388 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
https://access.redhat.com/security/cve/CVE-2019-20388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20388
https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68
https://linux.oracle.com/cve/CVE-2019-20388.html
https://linux.oracle.com/errata/ELSA-2020-4479.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://nvd.nist.gov/vuln/detail/CVE-2019-20388
https://security.gentoo.org/glsa/202010-04
https://security.netapp.com/advisory/ntap-20200702-0005/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libxml2 | CVE-2020-24977 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html
https://access.redhat.com/security/cve/CVE-2020-24977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977
https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
https://linux.oracle.com/cve/CVE-2020-24977.html
https://linux.oracle.com/errata/ELSA-2021-1597.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/
https://nvd.nist.gov/vuln/detail/CVE-2020-24977
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20200924-0001/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libxml2 | CVE-2020-7595 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
https://access.redhat.com/security/cve/CVE-2020-7595
https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595
https://github.com/advisories/GHSA-7553-jr98-vx47
https://github.com/sparklemotion/nokogiri/issues/1992
https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076
https://linux.oracle.com/cve/CVE-2020-7595.html
https://linux.oracle.com/errata/ELSA-2020-4479.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://nvd.nist.gov/vuln/detail/CVE-2020-7595
https://security.gentoo.org/glsa/202010-04
https://security.netapp.com/advisory/ntap-20200702-0005/
https://ubuntu.com/security/notices/USN-4274-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
https://usn.ubuntu.com/4274-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libxml2 | CVE-2021-3516 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3516
https://bugzilla.redhat.com/show_bug.cgi?id=1954225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539
https://gitlab.gnome.org/GNOME/libxml2/-/issues/230
https://linux.oracle.com/cve/CVE-2021-3516.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210716-0005/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libxml2 | CVE-2021-3517 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3517
https://bugzilla.redhat.com/show_bug.cgi?id=1954232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517
https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2
https://gitlab.gnome.org/GNOME/libxml2/-/issues/235
https://linux.oracle.com/cve/CVE-2021-3517.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3517
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libxml2 | CVE-2021-3518 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
http://seclists.org/fulldisclosure/2021/Jul/55
http://seclists.org/fulldisclosure/2021/Jul/58
http://seclists.org/fulldisclosure/2021/Jul/59
https://access.redhat.com/security/cve/CVE-2021-3518
https://bugzilla.redhat.com/show_bug.cgi?id=1954242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7
https://gitlab.gnome.org/GNOME/libxml2/-/issues/237
https://linux.oracle.com/cve/CVE-2021-3518.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3518
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://support.apple.com/kb/HT212601
https://support.apple.com/kb/HT212602
https://support.apple.com/kb/HT212604
https://support.apple.com/kb/HT212605
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libxml2 | CVE-2021-3537 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3537
https://bugzilla.redhat.com/show_bug.cgi?id=1956522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537
https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61
https://gitlab.gnome.org/GNOME/libxml2/-/issues/243
https://gitlab.gnome.org/GNOME/libxml2/-/issues/244
https://gitlab.gnome.org/GNOME/libxml2/-/issues/245
https://linux.oracle.com/cve/CVE-2021-3537.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3537
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libxml2 | CVE-2021-3541 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3541
https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/
https://bugzilla.redhat.com/show_bug.cgi?id=1950515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541
https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e
https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)
https://linux.oracle.com/cve/CVE-2021-3541.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://security.netapp.com/advisory/ntap-20210805-0007/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libxml2 | CVE-2022-23308 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/34
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/36
http://seclists.org/fulldisclosure/2022/May/37
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://nvd.nist.gov/vuln/detail/CVE-2022-23308
https://security.netapp.com/advisory/ntap-20220331-0008/
https://support.apple.com/kb/HT213253
https://support.apple.com/kb/HT213254
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://support.apple.com/kb/HT213258
https://ubuntu.com/security/notices/USN-5324-1
https://ubuntu.com/security/notices/USN-5422-1
| +| libxml2 | CVE-2022-29824 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
https://www.debian.org/security/2022/dsa-5142
| +| libxml2 | CVE-2017-18258 | LOW | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 |
Expand...https://access.redhat.com/security/cve/CVE-2017-18258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258
https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb
https://github.com/advisories/GHSA-882p-jqgm-f45g
https://kc.mcafee.com/corporate/index?page=content&id=SB10284
https://linux.oracle.com/cve/CVE-2017-18258.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2017-18258
https://security.netapp.com/advisory/ntap-20190719-0001/
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
| +| libxml2 | CVE-2017-5969 | LOW | 2.9.1-6.el7_2.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/11/05/3
http://www.openwall.com/lists/oss-security/2017/02/13/1
http://www.securityfocus.com/bid/96188
https://access.redhat.com/security/cve/CVE-2017-5969
https://bugzilla.gnome.org/show_bug.cgi?id=778519
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
| +| libxml2 | CVE-2017-8872 | LOW | 2.9.1-6.el7_2.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-8872
https://bugzilla.gnome.org/show_bug.cgi?id=775200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://ubuntu.com/security/notices/USN-4991-1
| +| libxml2 | CVE-2017-9048 | LOW | 2.9.1-6.el7_2.3 | |
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98556
https://access.redhat.com/security/cve/CVE-2017-9048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
| +| libxml2 | CVE-2018-14567 | LOW | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 |
Expand...http://www.securityfocus.com/bid/105198
https://access.redhat.com/security/cve/CVE-2018-14567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567
https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
https://linux.oracle.com/cve/CVE-2018-14567.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
| +| libxml2-python | CVE-2015-8035 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 |
Expand...http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177341.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177381.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://www.debian.org/security/2015/dsa-3430
http://www.openwall.com/lists/oss-security/2015/11/02/2
http://www.openwall.com/lists/oss-security/2015/11/02/4
http://www.openwall.com/lists/oss-security/2015/11/03/1
http://www.securityfocus.com/bid/77390
http://www.securitytracker.com/id/1034243
http://www.ubuntu.com/usn/USN-2812-1
http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2015-8035
https://bugzilla.gnome.org/show_bug.cgi?id=757466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://linux.oracle.com/cve/CVE-2015-8035.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://security.gentoo.org/glsa/201701-37
https://support.apple.com/HT206166
https://support.apple.com/HT206167
https://support.apple.com/HT206168
https://support.apple.com/HT206169
https://ubuntu.com/security/notices/USN-2812-1
| +| libxml2-python | CVE-2016-4483 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.debian.org/security/2016/dsa-3593
http://www.openwall.com/lists/oss-security/2016/05/03/8
http://www.openwall.com/lists/oss-security/2016/05/04/7
http://www.openwall.com/lists/oss-security/2016/06/07/4
http://www.openwall.com/lists/oss-security/2016/06/07/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/90013
http://www.securitytracker.com/id/1036348
https://access.redhat.com/security/cve/CVE-2016-4483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483
https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-37
https://ubuntu.com/security/notices/USN-2994-1
https://www.tenable.com/security/tns-2016-18
| +| libxml2-python | CVE-2016-4658 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7_9.6 |
Expand...http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
http://www.securityfocus.com/bid/93054
http://www.securitytracker.com/id/1036858
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2016-4658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658
https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b
https://github.com/advisories/GHSA-fr52-4hqw-p27f
https://github.com/sparklemotion/nokogiri/issues/1615
https://linux.oracle.com/cve/CVE-2016-4658.html
https://linux.oracle.com/errata/ELSA-2021-3810.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4658
https://security.gentoo.org/glsa/201701-37
https://support.apple.com/HT207141
https://support.apple.com/HT207142
https://support.apple.com/HT207143
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3235-1
| +| libxml2-python | CVE-2016-5131 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 |
Expand...http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1485.html
http://www.debian.org/security/2016/dsa-3637
http://www.securityfocus.com/bid/92053
http://www.securitytracker.com/id/1036428
http://www.securitytracker.com/id/1038623
http://www.ubuntu.com/usn/USN-3041-1
https://access.redhat.com/security/cve/CVE-2016-5131
https://bugzilla.redhat.com/show_bug.cgi?id=1358641
https://codereview.chromium.org/2127493002
https://crbug.com/623378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131
https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
https://linux.oracle.com/cve/CVE-2016-5131.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://security.gentoo.org/glsa/201610-09
https://security.gentoo.org/glsa/201701-37
https://source.android.com/security/bulletin/2017-05-01
https://support.apple.com/HT207141
https://support.apple.com/HT207142
https://support.apple.com/HT207143
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3041-1
https://ubuntu.com/security/notices/USN-3235-1
| +| libxml2-python | CVE-2016-9318 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxml2-python | CVE-2017-0663 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.securityfocus.com/bid/98877
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2017-0663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0663
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://source.android.com/security/bulletin/2017-06-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
| +| libxml2-python | CVE-2017-15412 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 |
Expand...http://www.securitytracker.com/id/1040348
https://access.redhat.com/errata/RHSA-2017:3401
https://access.redhat.com/errata/RHSA-2018:0287
https://access.redhat.com/security/cve/CVE-2017-15412
https://bugzilla.gnome.org/show_bug.cgi?id=783160
https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
https://crbug.com/727039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412
https://github.com/sparklemotion/nokogiri/issues/1714
https://linux.oracle.com/cve/CVE-2017-15412.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00014.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-15412.html
https://security.gentoo.org/glsa/201801-03
https://ubuntu.com/security/notices/USN-3513-1
https://ubuntu.com/security/notices/USN-3513-2
https://usn.ubuntu.com/usn/usn-3513-1/
https://www.debian.org/security/2018/dsa-4086
| +| libxml2-python | CVE-2017-16931 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16931
https://bugzilla.gnome.org/show_bug.cgi?id=766956
https://github.com/GNOME/libxml2/commit/e26630548e7d138d2c560844c43820b6767251e3
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
| +| libxml2-python | CVE-2017-16932 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2-python | CVE-2017-7375 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://www.securityfocus.com/bid/98877
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2017-7375
https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa
https://bugzilla.redhat.com/show_bug.cgi?id=1462203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7375
https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e
https://security.gentoo.org/glsa/201711-01
https://source.android.com/security/bulletin/2017-06-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://www.debian.org/security/2017/dsa-3952
| +| libxml2-python | CVE-2017-9047 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98599
https://access.redhat.com/security/cve/CVE-2017-9047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
| +| libxml2-python | CVE-2017-9049 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98601
https://access.redhat.com/security/cve/CVE-2017-9049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
| +| libxml2-python | CVE-2017-9050 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98568
https://access.redhat.com/security/cve/CVE-2017-9050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050
https://github.com/advisories/GHSA-8c56-cpmw-89x7
https://github.com/sparklemotion/nokogiri/issues/1673
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-9050
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-0663.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7375.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7376.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9047.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9048.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9049.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9050.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://usn.ubuntu.com/usn/usn-3424-1/
| +| libxml2-python | CVE-2018-14404 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 |
Expand...https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/security/cve/CVE-2018-14404
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817
https://bugzilla.redhat.com/show_bug.cgi?id=1595985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404
https://github.com/advisories/GHSA-6qvp-r6r3-9p7h
https://github.com/sparklemotion/nokogiri/issues/1785
https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594
https://gitlab.gnome.org/GNOME/libxml2/issues/10
https://groups.google.com/forum/#!msg/ruby-security-ann/uVrmO2HjqQw/Fw3ocLI0BQAJ
https://linux.oracle.com/cve/CVE-2018-14404.html
https://linux.oracle.com/errata/ELSA-2020-1827.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2018-14404
https://security.netapp.com/advisory/ntap-20190719-0002/
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxml2-python | CVE-2019-19956 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00005.html
https://access.redhat.com/security/cve/CVE-2019-19956
https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19956
https://gitlab.gnome.org/GNOME/libxml2/commit/5a02583c7e683896d84878bd90641d8d9b0d0549
https://linux.oracle.com/cve/CVE-2019-19956.html
https://linux.oracle.com/errata/ELSA-2020-4479.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://security.netapp.com/advisory/ntap-20200114-0002/
https://ubuntu.com/security/notices/USN-4274-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
https://usn.ubuntu.com/4274-1/
https://www.oracle.com/security-alerts/cpujul2020.html
| +| libxml2-python | CVE-2019-20388 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
https://access.redhat.com/security/cve/CVE-2019-20388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20388
https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68
https://linux.oracle.com/cve/CVE-2019-20388.html
https://linux.oracle.com/errata/ELSA-2020-4479.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://nvd.nist.gov/vuln/detail/CVE-2019-20388
https://security.gentoo.org/glsa/202010-04
https://security.netapp.com/advisory/ntap-20200702-0005/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libxml2-python | CVE-2020-24977 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html
https://access.redhat.com/security/cve/CVE-2020-24977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977
https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
https://linux.oracle.com/cve/CVE-2020-24977.html
https://linux.oracle.com/errata/ELSA-2021-1597.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/
https://nvd.nist.gov/vuln/detail/CVE-2020-24977
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20200924-0001/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libxml2-python | CVE-2020-7595 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.5 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
https://access.redhat.com/security/cve/CVE-2020-7595
https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595
https://github.com/advisories/GHSA-7553-jr98-vx47
https://github.com/sparklemotion/nokogiri/issues/1992
https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076
https://linux.oracle.com/cve/CVE-2020-7595.html
https://linux.oracle.com/errata/ELSA-2020-4479.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://nvd.nist.gov/vuln/detail/CVE-2020-7595
https://security.gentoo.org/glsa/202010-04
https://security.netapp.com/advisory/ntap-20200702-0005/
https://ubuntu.com/security/notices/USN-4274-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
https://usn.ubuntu.com/4274-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libxml2-python | CVE-2021-3516 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3516
https://bugzilla.redhat.com/show_bug.cgi?id=1954225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539
https://gitlab.gnome.org/GNOME/libxml2/-/issues/230
https://linux.oracle.com/cve/CVE-2021-3516.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210716-0005/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libxml2-python | CVE-2021-3517 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3517
https://bugzilla.redhat.com/show_bug.cgi?id=1954232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517
https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2
https://gitlab.gnome.org/GNOME/libxml2/-/issues/235
https://linux.oracle.com/cve/CVE-2021-3517.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3517
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libxml2-python | CVE-2021-3518 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
http://seclists.org/fulldisclosure/2021/Jul/55
http://seclists.org/fulldisclosure/2021/Jul/58
http://seclists.org/fulldisclosure/2021/Jul/59
https://access.redhat.com/security/cve/CVE-2021-3518
https://bugzilla.redhat.com/show_bug.cgi?id=1954242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7
https://gitlab.gnome.org/GNOME/libxml2/-/issues/237
https://linux.oracle.com/cve/CVE-2021-3518.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3518
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://support.apple.com/kb/HT212601
https://support.apple.com/kb/HT212602
https://support.apple.com/kb/HT212604
https://support.apple.com/kb/HT212605
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libxml2-python | CVE-2021-3537 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3537
https://bugzilla.redhat.com/show_bug.cgi?id=1956522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537
https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61
https://gitlab.gnome.org/GNOME/libxml2/-/issues/243
https://gitlab.gnome.org/GNOME/libxml2/-/issues/244
https://gitlab.gnome.org/GNOME/libxml2/-/issues/245
https://linux.oracle.com/cve/CVE-2021-3537.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3537
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libxml2-python | CVE-2021-3541 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3541
https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/
https://bugzilla.redhat.com/show_bug.cgi?id=1950515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541
https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e
https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)
https://linux.oracle.com/cve/CVE-2021-3541.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://security.netapp.com/advisory/ntap-20210805-0007/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libxml2-python | CVE-2022-23308 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/34
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/36
http://seclists.org/fulldisclosure/2022/May/37
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://nvd.nist.gov/vuln/detail/CVE-2022-23308
https://security.netapp.com/advisory/ntap-20220331-0008/
https://support.apple.com/kb/HT213253
https://support.apple.com/kb/HT213254
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://support.apple.com/kb/HT213258
https://ubuntu.com/security/notices/USN-5324-1
https://ubuntu.com/security/notices/USN-5422-1
| +| libxml2-python | CVE-2022-29824 | MEDIUM | 2.9.1-6.el7_2.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
https://www.debian.org/security/2022/dsa-5142
| +| libxml2-python | CVE-2017-18258 | LOW | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 |
Expand...https://access.redhat.com/security/cve/CVE-2017-18258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258
https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb
https://github.com/advisories/GHSA-882p-jqgm-f45g
https://kc.mcafee.com/corporate/index?page=content&id=SB10284
https://linux.oracle.com/cve/CVE-2017-18258.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2017-18258
https://security.netapp.com/advisory/ntap-20190719-0001/
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
| +| libxml2-python | CVE-2017-5969 | LOW | 2.9.1-6.el7_2.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/11/05/3
http://www.openwall.com/lists/oss-security/2017/02/13/1
http://www.securityfocus.com/bid/96188
https://access.redhat.com/security/cve/CVE-2017-5969
https://bugzilla.gnome.org/show_bug.cgi?id=778519
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
| +| libxml2-python | CVE-2017-8872 | LOW | 2.9.1-6.el7_2.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-8872
https://bugzilla.gnome.org/show_bug.cgi?id=775200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://ubuntu.com/security/notices/USN-4991-1
| +| libxml2-python | CVE-2017-9048 | LOW | 2.9.1-6.el7_2.3 | |
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98556
https://access.redhat.com/security/cve/CVE-2017-9048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
| +| libxml2-python | CVE-2018-14567 | LOW | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 |
Expand...http://www.securityfocus.com/bid/105198
https://access.redhat.com/security/cve/CVE-2018-14567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567
https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
https://linux.oracle.com/cve/CVE-2018-14567.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
| +| lua | CVE-2014-5461 | MEDIUM | 5.1.4-15.el7 | |
Expand...http://advisories.mageia.org/MGASA-2014-0414.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00030.html
http://secunia.com/advisories/59890
http://secunia.com/advisories/60869
http://secunia.com/advisories/61411
http://www.debian.org/security/2014/dsa-3015
http://www.debian.org/security/2014/dsa-3016
http://www.lua.org/bugs.html#5.2.2-1
http://www.mandriva.com/security/advisories?name=MDVSA-2015:144
http://www.openwall.com/lists/oss-security/2014/08/21/1
http://www.openwall.com/lists/oss-security/2014/08/21/4
http://www.openwall.com/lists/oss-security/2014/08/27/2
http://www.securityfocus.com/bid/69342
http://www.ubuntu.com/usn/USN-2338-1
https://access.redhat.com/security/cve/CVE-2014-5461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5461
https://security.gentoo.org/glsa/201701-53
https://ubuntu.com/security/notices/USN-2338-1
| +| lua | CVE-2021-43519 | MEDIUM | 5.1.4-15.el7 | |
Expand...http://lua-users.org/lists/lua-l/2021-10/msg00123.html
http://lua-users.org/lists/lua-l/2021-11/msg00015.html
https://access.redhat.com/security/cve/CVE-2021-43519
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XHFYHGSZKL53VCLSJSAJ6VMFGAIXKO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3EMGAQ5Y6GXJLY4K5DUOOEQT4MZ4J4F/
https://nvd.nist.gov/vuln/detail/CVE-2021-43519
| +| lz4 | CVE-2019-17543 | MEDIUM | 1.7.5-3.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| lz4 | CVE-2021-3520 | MEDIUM | 1.7.5-3.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3520.json
https://access.redhat.com/security/cve/CVE-2021-3520
https://bugzilla.redhat.com/show_bug.cgi?id=1954559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520
https://errata.almalinux.org/8/ALSA-2021-2575.html
https://github.com/lz4/lz4/pull/972
https://linux.oracle.com/cve/CVE-2021-3520.html
https://linux.oracle.com/errata/ELSA-2021-2575.html
https://security.netapp.com/advisory/ntap-20211104-0005/
https://ubuntu.com/security/notices/USN-4968-1
https://ubuntu.com/security/notices/USN-4968-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| mesa-dri-drivers | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
| +| mesa-filesystem | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
| +| mesa-libEGL | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
| +| mesa-libGL | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
| +| mesa-libGL-devel | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
| +| mesa-libOSMesa | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
| +| mesa-libOSMesa-devel | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
| +| mesa-libgbm | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
| +| mesa-libglapi | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
| +| mpfr | CVE-2014-9474 | LOW | 3.1.1-4.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147737.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147745.html
http://www.mpfr.org/mpfr-3.1.2/patch11
http://www.openwall.com/lists/oss-security/2015/01/03/12
http://www.securityfocus.com/bid/71542
https://access.redhat.com/security/cve/CVE-2014-9474
https://bugzilla.redhat.com/show_bug.cgi?id=1171701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474
https://gforge.inria.fr/scm/viewvc.php/mpfr?revision=9243&view=revision
https://gforge.inria.fr/scm/viewvc.php?view=rev&root=mpfr&revision=9243
https://gmplib.org/list-archives/gmp-bugs/2013-December/003267.html
https://security.gentoo.org/glsa/201512-06
| +| nasm | CVE-2017-10686 | MEDIUM | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-10686
https://bugzilla.nasm.us/show_bug.cgi?id=3392414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10686
https://security.gentoo.org/glsa/201903-19
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2017-11111 | MEDIUM | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-11111
https://bugzilla.nasm.us/show_bug.cgi?id=3392415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11111
https://security.gentoo.org/glsa/201903-19
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2017-14228 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-14228
https://bugzilla.nasm.us/show_bug.cgi?id=3392423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14228
https://security.gentoo.org/glsa/201903-19
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2017-17810 | LOW | 2.10.07-7.el7 | |
Expand...http://repo.or.cz/nasm.git/commit/59ce1c67b16967c652765e62aa130b7e43f21dd4
https://access.redhat.com/security/cve/CVE-2017-17810
https://bugzilla.nasm.us/show_bug.cgi?id=3392431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17810
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2017-17811 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17811
https://bugzilla.nasm.us/show_bug.cgi?id=3392432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17811
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2017-17812 | LOW | 2.10.07-7.el7 | |
Expand...http://repo.or.cz/nasm.git/commit/9b7ee09abfd426b99aa1ea81d19a3b2818eeabf9
https://access.redhat.com/security/cve/CVE-2017-17812
https://bugzilla.nasm.us/show_bug.cgi?id=3392424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17812
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2017-17813 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17813
https://bugzilla.nasm.us/show_bug.cgi?id=3392429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17813
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2017-17814 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17814
https://bugzilla.nasm.us/show_bug.cgi?id=3392430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17814
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2017-17815 | LOW | 2.10.07-7.el7 | |
Expand...http://repo.or.cz/nasm.git/commit/c9244eaadd05b27637cde06021bac3fa1d920aa3
https://access.redhat.com/security/cve/CVE-2017-17815
https://bugzilla.nasm.us/show_bug.cgi?id=3392436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17815
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2017-17816 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17816
https://bugzilla.nasm.us/show_bug.cgi?id=3392426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17816
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2017-17817 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17817
https://bugzilla.nasm.us/show_bug.cgi?id=3392427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17817
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2017-17818 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17818
https://bugzilla.nasm.us/show_bug.cgi?id=3392428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17818
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2017-17819 | LOW | 2.10.07-7.el7 | |
Expand...http://repo.or.cz/nasm.git/commit/7524cfd91492e6e3719b959498be584a9ced13af
https://access.redhat.com/security/cve/CVE-2017-17819
https://bugzilla.nasm.us/show_bug.cgi?id=3392435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17819
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2017-17820 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-17820
https://bugzilla.nasm.us/show_bug.cgi?id=3392433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17820
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2018-1000667 | LOW | 2.10.07-7.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-1000667
https://bugzilla.nasm.us/show_bug.cgi?id=3392507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000667
https://github.com/cyrillos/nasm/issues/3
| +| nasm | CVE-2018-1000886 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-1000886
https://bugzilla.nasm.us/show_bug.cgi?id=3392514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000886
| +| nasm | CVE-2018-10016 | LOW | 2.10.07-7.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-10016
https://bugzilla.nasm.us/show_bug.cgi?id=3392473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10016
| +| nasm | CVE-2018-10254 | LOW | 2.10.07-7.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-10254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10254
https://sourceforge.net/p/nasm/bugs/561/
| +| nasm | CVE-2018-10316 | LOW | 2.10.07-7.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-10316
https://bugzilla.nasm.us/show_bug.cgi?id=3392474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10316
| +| nasm | CVE-2018-16382 | LOW | 2.10.07-7.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-16382
https://bugzilla.nasm.us/show_bug.cgi?id=3392503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16382
| +| nasm | CVE-2018-19213 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-19213
https://bugzilla.nasm.us/show_bug.cgi?id=3392524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19213
| +| nasm | CVE-2018-19214 | LOW | 2.10.07-7.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-19214
https://bugzilla.nasm.us/show_bug.cgi?id=3392521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19214
https://repo.or.cz/nasm.git/commit/661f723d39e03ca6eb05d7376a43ca33db478354
| +| nasm | CVE-2018-19215 | LOW | 2.10.07-7.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-19215
https://bugzilla.nasm.us/show_bug.cgi?id=3392525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19215
https://repo.or.cz/nasm.git/commit/4b5b737d4991578b1918303dc0fd9c9ab5c7ce4f
| +| nasm | CVE-2018-19755 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-19755
https://bugzilla.nasm.us/show_bug.cgi?id=3392528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19755
https://repo.or.cz/nasm.git/commit/3079f7966dbed4497e36d5067cbfd896a90358cb
| +| nasm | CVE-2018-20535 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-20535
https://bugzilla.nasm.us/show_bug.cgi?id=3392530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20535
| +| nasm | CVE-2018-20538 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-20538
https://bugzilla.nasm.us/show_bug.cgi?id=3392531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20538
| +| nasm | CVE-2018-8881 | LOW | 2.10.07-7.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-8881
https://bugzilla.nasm.us/show_bug.cgi?id=3392446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8881
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
| +| nasm | CVE-2018-8882 | LOW | 2.10.07-7.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-8882
https://bugzilla.nasm.us/show_bug.cgi?id=3392445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8882
| +| nasm | CVE-2018-8883 | LOW | 2.10.07-7.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-8883
https://bugzilla.nasm.us/show_bug.cgi?id=3392447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8883
| +| nasm | CVE-2019-20334 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-20334
https://bugzilla.nasm.us/show_bug.cgi?id=3392548#c4
https://bugzilla.nasm.us/show_bug.cgi?id=3392638
| +| nasm | CVE-2019-20352 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-20352
https://bugzilla.nasm.us/show_bug.cgi?id=3392636
| +| nasm | CVE-2019-6290 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-6290
https://bugzilla.nasm.us/show_bug.cgi?id=3392548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6290
| +| nasm | CVE-2019-6291 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-6291
https://bugzilla.nasm.us/show_bug.cgi?id=3392549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6291
| +| nasm | CVE-2019-8343 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-8343
https://bugzilla.nasm.us/show_bug.cgi?id=3392556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8343
| +| nasm | CVE-2020-18974 | LOW | 2.10.07-7.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-18974
https://bugzilla.nasm.us/show_bug.cgi?id=3392568
| +| ncurses | CVE-2017-10684 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-10684
https://bugzilla.redhat.com/show_bug.cgi?id=1464687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses | CVE-2017-10685 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-10685
https://bugzilla.redhat.com/show_bug.cgi?id=1464692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses | CVE-2019-17594 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| ncurses | CVE-2019-17595 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| ncurses | CVE-2021-39537 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses | CVE-2017-11112 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-11112
https://bugzilla.redhat.com/show_bug.cgi?id=1464686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses | CVE-2017-11113 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-11113
https://bugzilla.redhat.com/show_bug.cgi?id=1464691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses | CVE-2017-13728 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13728
https://bugzilla.redhat.com/show_bug.cgi?id=1484274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses | CVE-2017-13729 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13729
https://bugzilla.redhat.com/show_bug.cgi?id=1484276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses | CVE-2017-13730 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13730
https://bugzilla.redhat.com/show_bug.cgi?id=1484284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses | CVE-2017-13731 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13731
https://bugzilla.redhat.com/show_bug.cgi?id=1484285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses | CVE-2017-13732 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13732
https://bugzilla.redhat.com/show_bug.cgi?id=1484287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses | CVE-2017-13733 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13733
https://bugzilla.redhat.com/show_bug.cgi?id=1484290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses | CVE-2017-13734 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13734
https://bugzilla.redhat.com/show_bug.cgi?id=1484291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses | CVE-2017-16879 | LOW | 5.9-14.20130511.el7_4 | |
Expand...http://invisible-island.net/ncurses/NEWS.html#t20171125
http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2017-16879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
| +| ncurses | CVE-2018-19211 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
| +| ncurses | CVE-2018-19217 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-19217
https://bugzilla.redhat.com/show_bug.cgi?id=1643753
| +| ncurses-base | CVE-2017-10684 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-10684
https://bugzilla.redhat.com/show_bug.cgi?id=1464687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-base | CVE-2017-10685 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-10685
https://bugzilla.redhat.com/show_bug.cgi?id=1464692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-base | CVE-2019-17594 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| ncurses-base | CVE-2019-17595 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| ncurses-base | CVE-2021-39537 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2017-11112 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-11112
https://bugzilla.redhat.com/show_bug.cgi?id=1464686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-base | CVE-2017-11113 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-11113
https://bugzilla.redhat.com/show_bug.cgi?id=1464691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-base | CVE-2017-13728 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13728
https://bugzilla.redhat.com/show_bug.cgi?id=1484274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-base | CVE-2017-13729 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13729
https://bugzilla.redhat.com/show_bug.cgi?id=1484276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-base | CVE-2017-13730 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13730
https://bugzilla.redhat.com/show_bug.cgi?id=1484284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-base | CVE-2017-13731 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13731
https://bugzilla.redhat.com/show_bug.cgi?id=1484285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-base | CVE-2017-13732 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13732
https://bugzilla.redhat.com/show_bug.cgi?id=1484287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-base | CVE-2017-13733 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13733
https://bugzilla.redhat.com/show_bug.cgi?id=1484290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-base | CVE-2017-13734 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13734
https://bugzilla.redhat.com/show_bug.cgi?id=1484291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-base | CVE-2017-16879 | LOW | 5.9-14.20130511.el7_4 | |
Expand...http://invisible-island.net/ncurses/NEWS.html#t20171125
http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2017-16879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
| +| ncurses-base | CVE-2018-19211 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
| +| ncurses-base | CVE-2018-19217 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-19217
https://bugzilla.redhat.com/show_bug.cgi?id=1643753
| +| ncurses-libs | CVE-2017-10684 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-10684
https://bugzilla.redhat.com/show_bug.cgi?id=1464687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-libs | CVE-2017-10685 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-10685
https://bugzilla.redhat.com/show_bug.cgi?id=1464692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-libs | CVE-2019-17594 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| ncurses-libs | CVE-2019-17595 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| +| ncurses-libs | CVE-2021-39537 | MEDIUM | 5.9-14.20130511.el7_4 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-libs | CVE-2017-11112 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-11112
https://bugzilla.redhat.com/show_bug.cgi?id=1464686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-libs | CVE-2017-11113 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-11113
https://bugzilla.redhat.com/show_bug.cgi?id=1464691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-libs | CVE-2017-13728 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13728
https://bugzilla.redhat.com/show_bug.cgi?id=1484274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-libs | CVE-2017-13729 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13729
https://bugzilla.redhat.com/show_bug.cgi?id=1484276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-libs | CVE-2017-13730 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13730
https://bugzilla.redhat.com/show_bug.cgi?id=1484284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-libs | CVE-2017-13731 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13731
https://bugzilla.redhat.com/show_bug.cgi?id=1484285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-libs | CVE-2017-13732 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13732
https://bugzilla.redhat.com/show_bug.cgi?id=1484287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-libs | CVE-2017-13733 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13733
https://bugzilla.redhat.com/show_bug.cgi?id=1484290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-libs | CVE-2017-13734 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13734
https://bugzilla.redhat.com/show_bug.cgi?id=1484291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
| +| ncurses-libs | CVE-2017-16879 | LOW | 5.9-14.20130511.el7_4 | |
Expand...http://invisible-island.net/ncurses/NEWS.html#t20171125
http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2017-16879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
| +| ncurses-libs | CVE-2018-19211 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
| +| ncurses-libs | CVE-2018-19217 | LOW | 5.9-14.20130511.el7_4 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-19217
https://bugzilla.redhat.com/show_bug.cgi?id=1643753
| +| nspr | CVE-2016-1951 | MEDIUM | 4.21.0-1.el7 | |
Expand...http://www.securityfocus.com/bid/92385
http://www.securitytracker.com/id/1036590
http://www.ubuntu.com/usn/USN-3023-1
https://access.redhat.com/security/cve/CVE-2016-1951
https://bugzilla.mozilla.org/show_bug.cgi?id=1174015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1951
https://groups.google.com/forum/#!topic/mozilla.dev.tech.nspr/dV4MyMsg6jw
https://groups.google.com/forum/message/raw?msg=mozilla.dev.tech.nspr/dV4MyMsg6jw/hhWcXOgJDQAJ
https://hg.mozilla.org/projects/nspr/rev/96381e3aaae2
https://ubuntu.com/security/notices/USN-3023-1
https://ubuntu.com/security/notices/USN-3028-1
| +| nspr | CVE-2019-11719 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
| +| nspr | CVE-2019-11756 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
| +| nspr | CVE-2019-17006 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
| +| nspr | CVE-2020-12400 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nspr | CVE-2020-12401 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nspr | CVE-2020-12402 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
| +| nspr | CVE-2020-12403 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
| +| nspr | CVE-2020-6829 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nspr | CVE-2019-11727 | LOW | 4.21.0-1.el7 | 4.25.0-2.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
| +| nspr | CVE-2019-17023 | LOW | 4.21.0-1.el7 | 4.25.0-2.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
| +| nss | CVE-2021-43527 | CRITICAL | 3.44.0-4.el7 | 3.67.0-4.el7_9 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json
https://access.redhat.com/security/cve/CVE-2021-43527
https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/
https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html
https://linux.oracle.com/cve/CVE-2021-43527.html
https://linux.oracle.com/errata/ELSA-2021-9591.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43527
https://security.netapp.com/advisory/ntap-20211229-0002/
https://ubuntu.com/security/notices/USN-5168-1
https://ubuntu.com/security/notices/USN-5168-2
https://ubuntu.com/security/notices/USN-5168-3
https://ubuntu.com/security/notices/USN-5168-4
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
https://www.mozilla.org/security/advisories/mfsa2021-51/
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| nss | CVE-2021-43529 | CRITICAL | 3.44.0-4.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-43527
https://access.redhat.com/security/cve/CVE-2021-43529
https://access.redhat.com/security/vulnerabilities/RHSB-2021-008
https://bugzilla.mozilla.org/show_bug.cgi?id=1738501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43529
https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
https://www.openwall.com/lists/oss-security/2021/12/01/6
| +| nss | CVE-2019-11745 | HIGH | 3.44.0-4.el7 | 3.44.0-7.el7_7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2020:0243
https://access.redhat.com/errata/RHSA-2020:0466
https://access.redhat.com/security/cve/CVE-2019-11745
https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes
https://linux.oracle.com/cve/CVE-2019-11745.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202003-02
https://security.gentoo.org/glsa/202003-10
https://security.gentoo.org/glsa/202003-37
https://ubuntu.com/security/notices/USN-4203-1
https://ubuntu.com/security/notices/USN-4203-2
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://ubuntu.com/security/notices/USN-4241-1
https://ubuntu.com/security/notices/USN-4335-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://usn.ubuntu.com/4241-1/
https://usn.ubuntu.com/4335-1/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745
https://www.mozilla.org/security/advisories/mfsa2019-36/
https://www.mozilla.org/security/advisories/mfsa2019-37/
https://www.mozilla.org/security/advisories/mfsa2019-38/
| +| nss | CVE-2015-2808 | MEDIUM | 3.44.0-4.el7 | |
Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
| +| nss | CVE-2016-2183 | MEDIUM | 3.44.0-4.el7 | |
Expand...http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://rhn.redhat.com/errata/RHSA-2017-0462.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/fulldisclosure/2017/May/105
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/542005/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
http://www.securityfocus.com/bid/92630
http://www.securityfocus.com/bid/95568
http://www.securitytracker.com/id/1036696
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3179-1
http://www.ubuntu.com/usn/USN-3194-1
http://www.ubuntu.com/usn/USN-3198-1
http://www.ubuntu.com/usn/USN-3270-1
http://www.ubuntu.com/usn/USN-3372-1
https://access.redhat.com/articles/2548661
https://access.redhat.com/errata/RHSA-2016:1940
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2018:2123
https://access.redhat.com/errata/RHSA-2019:1245
https://access.redhat.com/errata/RHSA-2019:2859
https://access.redhat.com/errata/RHSA-2020:0451
https://access.redhat.com/security/cve/CVE-2016-2183
https://access.redhat.com/security/cve/cve-2016-2183
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
https://bto.bluecoat.com/security-advisory/sa133
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
https://community.qualys.com/thread/16555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
https://linux.oracle.com/cve/CVE-2016-2183.html
https://linux.oracle.com/errata/ELSA-2018-2123.html
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
https://seclists.org/bugtraq/2018/Nov/21
https://security-tracker.debian.org/tracker/CVE-2016-2183
https://security.gentoo.org/glsa/201612-16
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20160915-0001/
https://security.netapp.com/advisory/ntap-20170119-0001/
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
https://support.f5.com/csp/article/K13167034
https://sweet32.info/
https://twitter.com/symantec/status/768786631159603200
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://ubuntu.com/security/notices/USN-3270-1
https://ubuntu.com/security/notices/USN-3372-1
https://wiki.opendaylight.org/view/Security_Advisories
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.exploit-db.com/exploits/42091/
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
https://www.tenable.com/security/tns-2017-09
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
| +| nss | CVE-2016-9074 | MEDIUM | 3.44.0-4.el7 | |
Expand...http://www.securityfocus.com/bid/94341
http://www.securitytracker.com/id/1037298
https://access.redhat.com/security/cve/CVE-2016-9074
https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
https://security.gentoo.org/glsa/201701-15
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-3163-1
https://www.debian.org/security/2016/dsa-3730
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074
https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-89/
https://www.mozilla.org/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-93/
| +| nss | CVE-2016-9574 | MEDIUM | 3.44.0-4.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2016-9574
https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
| +| nss | CVE-2018-18508 | MEDIUM | 3.44.0-4.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-18508
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.42.1_release_notes
https://linux.oracle.com/cve/CVE-2018-18508.html
https://linux.oracle.com/errata/ELSA-2019-1951.html
https://ubuntu.com/security/notices/USN-3898-1
https://ubuntu.com/security/notices/USN-3898-2
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
| +| nss | CVE-2019-11719 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
| +| nss | CVE-2019-11729 | MEDIUM | 3.44.0-4.el7 | 3.44.0-7.el7_7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/errata/RHSA-2019:4190
https://access.redhat.com/security/cve/CVE-2019-11729
https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
https://linux.oracle.com/cve/CVE-2019-11729.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
| +| nss | CVE-2019-11756 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
| +| nss | CVE-2019-17006 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
| +| nss | CVE-2020-12399 | MEDIUM | 3.44.0-4.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12399
https://bugzilla.mozilla.org/show_bug.cgi?id=1631576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.4_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.52.1_release_notes
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202007-49
https://ubuntu.com/security/notices/USN-4383-1
https://ubuntu.com/security/notices/USN-4397-1
https://ubuntu.com/security/notices/USN-4397-2
https://ubuntu.com/security/notices/USN-4421-1
https://usn.ubuntu.com/4421-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-20/#CVE-2020-12399
https://www.mozilla.org/security/advisories/mfsa2020-20/
https://www.mozilla.org/security/advisories/mfsa2020-21/
https://www.mozilla.org/security/advisories/mfsa2020-22/
| +| nss | CVE-2020-12400 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss | CVE-2020-12401 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss | CVE-2020-12402 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
| +| nss | CVE-2020-12403 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
| +| nss | CVE-2020-25648 | MEDIUM | 3.44.0-4.el7 | 3.53.1-7.el7_9 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json
https://access.redhat.com/security/cve/CVE-2020-25648
https://bugzilla.redhat.com/show_bug.cgi?id=1887319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
https://linux.oracle.com/cve/CVE-2020-25648.html
https://linux.oracle.com/errata/ELSA-2021-3572.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
https://ubuntu.com/security/notices/USN-5410-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| nss | CVE-2020-6829 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss | CVE-2019-11727 | LOW | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
| +| nss | CVE-2019-17023 | LOW | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
| +| nss | CVE-2020-12413 | LOW | 3.44.0-4.el7 | |
Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al.
Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf
https://access.redhat.com/security/cve/CVE-2020-12413
| +| nss-softokn | CVE-2019-11745 | HIGH | 3.44.0-5.el7 | 3.44.0-8.el7_7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2020:0243
https://access.redhat.com/errata/RHSA-2020:0466
https://access.redhat.com/security/cve/CVE-2019-11745
https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes
https://linux.oracle.com/cve/CVE-2019-11745.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202003-02
https://security.gentoo.org/glsa/202003-10
https://security.gentoo.org/glsa/202003-37
https://ubuntu.com/security/notices/USN-4203-1
https://ubuntu.com/security/notices/USN-4203-2
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://ubuntu.com/security/notices/USN-4241-1
https://ubuntu.com/security/notices/USN-4335-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://usn.ubuntu.com/4241-1/
https://usn.ubuntu.com/4335-1/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745
https://www.mozilla.org/security/advisories/mfsa2019-36/
https://www.mozilla.org/security/advisories/mfsa2019-37/
https://www.mozilla.org/security/advisories/mfsa2019-38/
| +| nss-softokn | CVE-2015-2613 | MEDIUM | 3.44.0-5.el7 | |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1485.html
http://rhn.redhat.com/errata/RHSA-2015-1488.html
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA
http://www.securityfocus.com/bid/75871
http://www.securitytracker.com/id/1032910
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
https://access.redhat.com/security/cve/CVE-2015-2613
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
https://kc.mcafee.com/corporate/index?page=content&id=SB10139
https://security.gentoo.org/glsa/201603-11
https://security.gentoo.org/glsa/201603-14
https://ubuntu.com/security/notices/USN-2696-1
| +| nss-softokn | CVE-2017-7781 | MEDIUM | 3.44.0-5.el7 | |
Expand...http://www.securityfocus.com/bid/100383
http://www.securitytracker.com/id/1039124
https://access.redhat.com/security/cve/CVE-2017-7781
https://bugzilla.mozilla.org/show_bug.cgi?id=1352039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7781
https://ubuntu.com/security/notices/USN-3391-1
https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/#CVE-2017-7781
https://www.mozilla.org/security/advisories/mfsa2017-18/
| +| nss-softokn | CVE-2019-11719 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
| +| nss-softokn | CVE-2019-11729 | MEDIUM | 3.44.0-5.el7 | 3.44.0-8.el7_7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/errata/RHSA-2019:4190
https://access.redhat.com/security/cve/CVE-2019-11729
https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
https://linux.oracle.com/cve/CVE-2019-11729.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
| +| nss-softokn | CVE-2019-11756 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
| +| nss-softokn | CVE-2019-17006 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
| +| nss-softokn | CVE-2020-12400 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-softokn | CVE-2020-12401 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-softokn | CVE-2020-12402 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
| +| nss-softokn | CVE-2020-12403 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
| +| nss-softokn | CVE-2020-6829 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-softokn | CVE-2016-1938 | LOW | 3.44.0-5.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
http://www.debian.org/security/2016/dsa-3688
http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.securityfocus.com/bid/81955
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1034825
http://www.ubuntu.com/usn/USN-2880-1
http://www.ubuntu.com/usn/USN-2880-2
http://www.ubuntu.com/usn/USN-2903-1
http://www.ubuntu.com/usn/USN-2903-2
http://www.ubuntu.com/usn/USN-2973-1
https://access.redhat.com/security/cve/CVE-2016-1938
https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
https://security.gentoo.org/glsa/201605-06
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-2880-1
https://ubuntu.com/security/notices/USN-2903-1
https://ubuntu.com/security/notices/USN-2973-1
https://www.mozilla.org/en-US/security/advisories/mfsa2016-07/
| +| nss-softokn | CVE-2019-11727 | LOW | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
| +| nss-softokn | CVE-2019-17023 | LOW | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
| +| nss-softokn-freebl | CVE-2019-11745 | HIGH | 3.44.0-5.el7 | 3.44.0-8.el7_7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2020:0243
https://access.redhat.com/errata/RHSA-2020:0466
https://access.redhat.com/security/cve/CVE-2019-11745
https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes
https://linux.oracle.com/cve/CVE-2019-11745.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202003-02
https://security.gentoo.org/glsa/202003-10
https://security.gentoo.org/glsa/202003-37
https://ubuntu.com/security/notices/USN-4203-1
https://ubuntu.com/security/notices/USN-4203-2
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://ubuntu.com/security/notices/USN-4241-1
https://ubuntu.com/security/notices/USN-4335-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://usn.ubuntu.com/4241-1/
https://usn.ubuntu.com/4335-1/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745
https://www.mozilla.org/security/advisories/mfsa2019-36/
https://www.mozilla.org/security/advisories/mfsa2019-37/
https://www.mozilla.org/security/advisories/mfsa2019-38/
| +| nss-softokn-freebl | CVE-2015-2613 | MEDIUM | 3.44.0-5.el7 | |
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1485.html
http://rhn.redhat.com/errata/RHSA-2015-1488.html
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA
http://www.securityfocus.com/bid/75871
http://www.securitytracker.com/id/1032910
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
https://access.redhat.com/security/cve/CVE-2015-2613
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
https://kc.mcafee.com/corporate/index?page=content&id=SB10139
https://security.gentoo.org/glsa/201603-11
https://security.gentoo.org/glsa/201603-14
https://ubuntu.com/security/notices/USN-2696-1
| +| nss-softokn-freebl | CVE-2017-7781 | MEDIUM | 3.44.0-5.el7 | |
Expand...http://www.securityfocus.com/bid/100383
http://www.securitytracker.com/id/1039124
https://access.redhat.com/security/cve/CVE-2017-7781
https://bugzilla.mozilla.org/show_bug.cgi?id=1352039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7781
https://ubuntu.com/security/notices/USN-3391-1
https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/#CVE-2017-7781
https://www.mozilla.org/security/advisories/mfsa2017-18/
| +| nss-softokn-freebl | CVE-2019-11719 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
| +| nss-softokn-freebl | CVE-2019-11729 | MEDIUM | 3.44.0-5.el7 | 3.44.0-8.el7_7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/errata/RHSA-2019:4190
https://access.redhat.com/security/cve/CVE-2019-11729
https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
https://linux.oracle.com/cve/CVE-2019-11729.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
| +| nss-softokn-freebl | CVE-2019-11756 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
| +| nss-softokn-freebl | CVE-2019-17006 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
| +| nss-softokn-freebl | CVE-2020-12400 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-softokn-freebl | CVE-2020-12401 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-softokn-freebl | CVE-2020-12402 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
| +| nss-softokn-freebl | CVE-2020-12403 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
| +| nss-softokn-freebl | CVE-2020-6829 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-softokn-freebl | CVE-2016-1938 | LOW | 3.44.0-5.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
http://www.debian.org/security/2016/dsa-3688
http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.securityfocus.com/bid/81955
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1034825
http://www.ubuntu.com/usn/USN-2880-1
http://www.ubuntu.com/usn/USN-2880-2
http://www.ubuntu.com/usn/USN-2903-1
http://www.ubuntu.com/usn/USN-2903-2
http://www.ubuntu.com/usn/USN-2973-1
https://access.redhat.com/security/cve/CVE-2016-1938
https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
https://security.gentoo.org/glsa/201605-06
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-2880-1
https://ubuntu.com/security/notices/USN-2903-1
https://ubuntu.com/security/notices/USN-2973-1
https://www.mozilla.org/en-US/security/advisories/mfsa2016-07/
| +| nss-softokn-freebl | CVE-2019-11727 | LOW | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
| +| nss-softokn-freebl | CVE-2019-17023 | LOW | 3.44.0-5.el7 | 3.53.1-6.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
| +| nss-sysinit | CVE-2021-43527 | CRITICAL | 3.44.0-4.el7 | 3.67.0-4.el7_9 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json
https://access.redhat.com/security/cve/CVE-2021-43527
https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/
https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html
https://linux.oracle.com/cve/CVE-2021-43527.html
https://linux.oracle.com/errata/ELSA-2021-9591.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43527
https://security.netapp.com/advisory/ntap-20211229-0002/
https://ubuntu.com/security/notices/USN-5168-1
https://ubuntu.com/security/notices/USN-5168-2
https://ubuntu.com/security/notices/USN-5168-3
https://ubuntu.com/security/notices/USN-5168-4
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
https://www.mozilla.org/security/advisories/mfsa2021-51/
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| nss-sysinit | CVE-2021-43529 | CRITICAL | 3.44.0-4.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-43527
https://access.redhat.com/security/cve/CVE-2021-43529
https://access.redhat.com/security/vulnerabilities/RHSB-2021-008
https://bugzilla.mozilla.org/show_bug.cgi?id=1738501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43529
https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
https://www.openwall.com/lists/oss-security/2021/12/01/6
| +| nss-sysinit | CVE-2019-11745 | HIGH | 3.44.0-4.el7 | 3.44.0-7.el7_7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2020:0243
https://access.redhat.com/errata/RHSA-2020:0466
https://access.redhat.com/security/cve/CVE-2019-11745
https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes
https://linux.oracle.com/cve/CVE-2019-11745.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202003-02
https://security.gentoo.org/glsa/202003-10
https://security.gentoo.org/glsa/202003-37
https://ubuntu.com/security/notices/USN-4203-1
https://ubuntu.com/security/notices/USN-4203-2
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://ubuntu.com/security/notices/USN-4241-1
https://ubuntu.com/security/notices/USN-4335-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://usn.ubuntu.com/4241-1/
https://usn.ubuntu.com/4335-1/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745
https://www.mozilla.org/security/advisories/mfsa2019-36/
https://www.mozilla.org/security/advisories/mfsa2019-37/
https://www.mozilla.org/security/advisories/mfsa2019-38/
| +| nss-sysinit | CVE-2015-2808 | MEDIUM | 3.44.0-4.el7 | |
Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
| +| nss-sysinit | CVE-2016-2183 | MEDIUM | 3.44.0-4.el7 | |
Expand...http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://rhn.redhat.com/errata/RHSA-2017-0462.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/fulldisclosure/2017/May/105
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/542005/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
http://www.securityfocus.com/bid/92630
http://www.securityfocus.com/bid/95568
http://www.securitytracker.com/id/1036696
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3179-1
http://www.ubuntu.com/usn/USN-3194-1
http://www.ubuntu.com/usn/USN-3198-1
http://www.ubuntu.com/usn/USN-3270-1
http://www.ubuntu.com/usn/USN-3372-1
https://access.redhat.com/articles/2548661
https://access.redhat.com/errata/RHSA-2016:1940
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2018:2123
https://access.redhat.com/errata/RHSA-2019:1245
https://access.redhat.com/errata/RHSA-2019:2859
https://access.redhat.com/errata/RHSA-2020:0451
https://access.redhat.com/security/cve/CVE-2016-2183
https://access.redhat.com/security/cve/cve-2016-2183
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
https://bto.bluecoat.com/security-advisory/sa133
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
https://community.qualys.com/thread/16555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
https://linux.oracle.com/cve/CVE-2016-2183.html
https://linux.oracle.com/errata/ELSA-2018-2123.html
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
https://seclists.org/bugtraq/2018/Nov/21
https://security-tracker.debian.org/tracker/CVE-2016-2183
https://security.gentoo.org/glsa/201612-16
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20160915-0001/
https://security.netapp.com/advisory/ntap-20170119-0001/
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
https://support.f5.com/csp/article/K13167034
https://sweet32.info/
https://twitter.com/symantec/status/768786631159603200
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://ubuntu.com/security/notices/USN-3270-1
https://ubuntu.com/security/notices/USN-3372-1
https://wiki.opendaylight.org/view/Security_Advisories
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.exploit-db.com/exploits/42091/
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
https://www.tenable.com/security/tns-2017-09
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
| +| nss-sysinit | CVE-2016-9074 | MEDIUM | 3.44.0-4.el7 | |
Expand...http://www.securityfocus.com/bid/94341
http://www.securitytracker.com/id/1037298
https://access.redhat.com/security/cve/CVE-2016-9074
https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
https://security.gentoo.org/glsa/201701-15
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-3163-1
https://www.debian.org/security/2016/dsa-3730
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074
https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-89/
https://www.mozilla.org/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-93/
| +| nss-sysinit | CVE-2016-9574 | MEDIUM | 3.44.0-4.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2016-9574
https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
| +| nss-sysinit | CVE-2018-18508 | MEDIUM | 3.44.0-4.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-18508
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.42.1_release_notes
https://linux.oracle.com/cve/CVE-2018-18508.html
https://linux.oracle.com/errata/ELSA-2019-1951.html
https://ubuntu.com/security/notices/USN-3898-1
https://ubuntu.com/security/notices/USN-3898-2
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
| +| nss-sysinit | CVE-2019-11719 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
| +| nss-sysinit | CVE-2019-11729 | MEDIUM | 3.44.0-4.el7 | 3.44.0-7.el7_7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/errata/RHSA-2019:4190
https://access.redhat.com/security/cve/CVE-2019-11729
https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
https://linux.oracle.com/cve/CVE-2019-11729.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
| +| nss-sysinit | CVE-2019-11756 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
| +| nss-sysinit | CVE-2019-17006 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
| +| nss-sysinit | CVE-2020-12399 | MEDIUM | 3.44.0-4.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12399
https://bugzilla.mozilla.org/show_bug.cgi?id=1631576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.4_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.52.1_release_notes
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202007-49
https://ubuntu.com/security/notices/USN-4383-1
https://ubuntu.com/security/notices/USN-4397-1
https://ubuntu.com/security/notices/USN-4397-2
https://ubuntu.com/security/notices/USN-4421-1
https://usn.ubuntu.com/4421-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-20/#CVE-2020-12399
https://www.mozilla.org/security/advisories/mfsa2020-20/
https://www.mozilla.org/security/advisories/mfsa2020-21/
https://www.mozilla.org/security/advisories/mfsa2020-22/
| +| nss-sysinit | CVE-2020-12400 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-sysinit | CVE-2020-12401 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-sysinit | CVE-2020-12402 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
| +| nss-sysinit | CVE-2020-12403 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
| +| nss-sysinit | CVE-2020-25648 | MEDIUM | 3.44.0-4.el7 | 3.53.1-7.el7_9 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json
https://access.redhat.com/security/cve/CVE-2020-25648
https://bugzilla.redhat.com/show_bug.cgi?id=1887319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
https://linux.oracle.com/cve/CVE-2020-25648.html
https://linux.oracle.com/errata/ELSA-2021-3572.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
https://ubuntu.com/security/notices/USN-5410-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| nss-sysinit | CVE-2020-6829 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-sysinit | CVE-2019-11727 | LOW | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
| +| nss-sysinit | CVE-2019-17023 | LOW | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
| +| nss-sysinit | CVE-2020-12413 | LOW | 3.44.0-4.el7 | |
Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al.
Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf
https://access.redhat.com/security/cve/CVE-2020-12413
| +| nss-tools | CVE-2021-43527 | CRITICAL | 3.44.0-4.el7 | 3.67.0-4.el7_9 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json
https://access.redhat.com/security/cve/CVE-2021-43527
https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/
https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html
https://linux.oracle.com/cve/CVE-2021-43527.html
https://linux.oracle.com/errata/ELSA-2021-9591.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43527
https://security.netapp.com/advisory/ntap-20211229-0002/
https://ubuntu.com/security/notices/USN-5168-1
https://ubuntu.com/security/notices/USN-5168-2
https://ubuntu.com/security/notices/USN-5168-3
https://ubuntu.com/security/notices/USN-5168-4
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
https://www.mozilla.org/security/advisories/mfsa2021-51/
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| nss-tools | CVE-2021-43529 | CRITICAL | 3.44.0-4.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-43527
https://access.redhat.com/security/cve/CVE-2021-43529
https://access.redhat.com/security/vulnerabilities/RHSB-2021-008
https://bugzilla.mozilla.org/show_bug.cgi?id=1738501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43529
https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
https://www.openwall.com/lists/oss-security/2021/12/01/6
| +| nss-tools | CVE-2019-11745 | HIGH | 3.44.0-4.el7 | 3.44.0-7.el7_7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2020:0243
https://access.redhat.com/errata/RHSA-2020:0466
https://access.redhat.com/security/cve/CVE-2019-11745
https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes
https://linux.oracle.com/cve/CVE-2019-11745.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202003-02
https://security.gentoo.org/glsa/202003-10
https://security.gentoo.org/glsa/202003-37
https://ubuntu.com/security/notices/USN-4203-1
https://ubuntu.com/security/notices/USN-4203-2
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://ubuntu.com/security/notices/USN-4241-1
https://ubuntu.com/security/notices/USN-4335-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://usn.ubuntu.com/4241-1/
https://usn.ubuntu.com/4335-1/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745
https://www.mozilla.org/security/advisories/mfsa2019-36/
https://www.mozilla.org/security/advisories/mfsa2019-37/
https://www.mozilla.org/security/advisories/mfsa2019-38/
| +| nss-tools | CVE-2015-2808 | MEDIUM | 3.44.0-4.el7 | |
Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
| +| nss-tools | CVE-2016-2183 | MEDIUM | 3.44.0-4.el7 | |
Expand...http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://rhn.redhat.com/errata/RHSA-2017-0462.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/fulldisclosure/2017/May/105
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/542005/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
http://www.securityfocus.com/bid/92630
http://www.securityfocus.com/bid/95568
http://www.securitytracker.com/id/1036696
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3179-1
http://www.ubuntu.com/usn/USN-3194-1
http://www.ubuntu.com/usn/USN-3198-1
http://www.ubuntu.com/usn/USN-3270-1
http://www.ubuntu.com/usn/USN-3372-1
https://access.redhat.com/articles/2548661
https://access.redhat.com/errata/RHSA-2016:1940
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2018:2123
https://access.redhat.com/errata/RHSA-2019:1245
https://access.redhat.com/errata/RHSA-2019:2859
https://access.redhat.com/errata/RHSA-2020:0451
https://access.redhat.com/security/cve/CVE-2016-2183
https://access.redhat.com/security/cve/cve-2016-2183
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
https://bto.bluecoat.com/security-advisory/sa133
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
https://community.qualys.com/thread/16555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
https://linux.oracle.com/cve/CVE-2016-2183.html
https://linux.oracle.com/errata/ELSA-2018-2123.html
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
https://seclists.org/bugtraq/2018/Nov/21
https://security-tracker.debian.org/tracker/CVE-2016-2183
https://security.gentoo.org/glsa/201612-16
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20160915-0001/
https://security.netapp.com/advisory/ntap-20170119-0001/
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
https://support.f5.com/csp/article/K13167034
https://sweet32.info/
https://twitter.com/symantec/status/768786631159603200
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://ubuntu.com/security/notices/USN-3270-1
https://ubuntu.com/security/notices/USN-3372-1
https://wiki.opendaylight.org/view/Security_Advisories
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.exploit-db.com/exploits/42091/
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
https://www.tenable.com/security/tns-2017-09
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
| +| nss-tools | CVE-2016-9074 | MEDIUM | 3.44.0-4.el7 | |
Expand...http://www.securityfocus.com/bid/94341
http://www.securitytracker.com/id/1037298
https://access.redhat.com/security/cve/CVE-2016-9074
https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
https://security.gentoo.org/glsa/201701-15
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-3163-1
https://www.debian.org/security/2016/dsa-3730
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074
https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-89/
https://www.mozilla.org/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-93/
| +| nss-tools | CVE-2016-9574 | MEDIUM | 3.44.0-4.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2016-9574
https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
| +| nss-tools | CVE-2018-18508 | MEDIUM | 3.44.0-4.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-18508
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.42.1_release_notes
https://linux.oracle.com/cve/CVE-2018-18508.html
https://linux.oracle.com/errata/ELSA-2019-1951.html
https://ubuntu.com/security/notices/USN-3898-1
https://ubuntu.com/security/notices/USN-3898-2
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
| +| nss-tools | CVE-2019-11719 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
| +| nss-tools | CVE-2019-11729 | MEDIUM | 3.44.0-4.el7 | 3.44.0-7.el7_7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/errata/RHSA-2019:4190
https://access.redhat.com/security/cve/CVE-2019-11729
https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
https://linux.oracle.com/cve/CVE-2019-11729.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
| +| nss-tools | CVE-2019-11756 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
| +| nss-tools | CVE-2019-17006 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
| +| nss-tools | CVE-2020-12399 | MEDIUM | 3.44.0-4.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12399
https://bugzilla.mozilla.org/show_bug.cgi?id=1631576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.4_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.52.1_release_notes
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202007-49
https://ubuntu.com/security/notices/USN-4383-1
https://ubuntu.com/security/notices/USN-4397-1
https://ubuntu.com/security/notices/USN-4397-2
https://ubuntu.com/security/notices/USN-4421-1
https://usn.ubuntu.com/4421-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-20/#CVE-2020-12399
https://www.mozilla.org/security/advisories/mfsa2020-20/
https://www.mozilla.org/security/advisories/mfsa2020-21/
https://www.mozilla.org/security/advisories/mfsa2020-22/
| +| nss-tools | CVE-2020-12400 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-tools | CVE-2020-12401 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-tools | CVE-2020-12402 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
| +| nss-tools | CVE-2020-12403 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
| +| nss-tools | CVE-2020-25648 | MEDIUM | 3.44.0-4.el7 | 3.53.1-7.el7_9 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json
https://access.redhat.com/security/cve/CVE-2020-25648
https://bugzilla.redhat.com/show_bug.cgi?id=1887319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
https://linux.oracle.com/cve/CVE-2020-25648.html
https://linux.oracle.com/errata/ELSA-2021-3572.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
https://ubuntu.com/security/notices/USN-5410-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| nss-tools | CVE-2020-6829 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-tools | CVE-2019-11727 | LOW | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
| +| nss-tools | CVE-2019-17023 | LOW | 3.44.0-4.el7 | 3.53.1-3.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
| +| nss-tools | CVE-2020-12413 | LOW | 3.44.0-4.el7 | |
Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al.
Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf
https://access.redhat.com/security/cve/CVE-2020-12413
| +| nss-util | CVE-2019-11745 | HIGH | 3.44.0-3.el7 | 3.44.0-4.el7_7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2020:0243
https://access.redhat.com/errata/RHSA-2020:0466
https://access.redhat.com/security/cve/CVE-2019-11745
https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes
https://linux.oracle.com/cve/CVE-2019-11745.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202003-02
https://security.gentoo.org/glsa/202003-10
https://security.gentoo.org/glsa/202003-37
https://ubuntu.com/security/notices/USN-4203-1
https://ubuntu.com/security/notices/USN-4203-2
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://ubuntu.com/security/notices/USN-4241-1
https://ubuntu.com/security/notices/USN-4335-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://usn.ubuntu.com/4241-1/
https://usn.ubuntu.com/4335-1/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745
https://www.mozilla.org/security/advisories/mfsa2019-36/
https://www.mozilla.org/security/advisories/mfsa2019-37/
https://www.mozilla.org/security/advisories/mfsa2019-38/
| +| nss-util | CVE-2019-11719 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
| +| nss-util | CVE-2019-11729 | MEDIUM | 3.44.0-3.el7 | 3.44.0-4.el7_7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/errata/RHSA-2019:4190
https://access.redhat.com/security/cve/CVE-2019-11729
https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
https://linux.oracle.com/cve/CVE-2019-11729.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
| +| nss-util | CVE-2019-11756 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
| +| nss-util | CVE-2019-17006 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
| +| nss-util | CVE-2020-12400 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-util | CVE-2020-12401 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-util | CVE-2020-12402 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
| +| nss-util | CVE-2020-12403 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
| +| nss-util | CVE-2020-6829 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| nss-util | CVE-2019-11727 | LOW | 3.44.0-3.el7 | 3.53.1-1.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
| +| nss-util | CVE-2019-17023 | LOW | 3.44.0-3.el7 | 3.53.1-1.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
| +| openldap | CVE-2019-13057 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://seclists.org/fulldisclosure/2019/Dec/26
http://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://access.redhat.com/security/cve/CVE-2019-13057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13057
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html
https://openldap.org/its/?findid=9038
https://seclists.org/bugtraq/2019/Dec/23
https://security.netapp.com/advisory/ntap-20190822-0004/
https://support.apple.com/kb/HT210788
https://ubuntu.com/security/notices/USN-4078-1
https://ubuntu.com/security/notices/USN-4078-2
https://usn.ubuntu.com/4078-1/
https://usn.ubuntu.com/4078-2/
https://www.openldap.org/its/?findid=9038
https://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| openldap | CVE-2019-13565 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://seclists.org/fulldisclosure/2019/Dec/26
http://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://access.redhat.com/security/cve/CVE-2019-13565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13565
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html
https://openldap.org/its/?findid=9052
https://seclists.org/bugtraq/2019/Dec/23
https://support.apple.com/kb/HT210788
https://support.f5.com/csp/article/K98008862?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4078-1
https://ubuntu.com/security/notices/USN-4078-2
https://usn.ubuntu.com/4078-1/
https://usn.ubuntu.com/4078-2/
https://www.openldap.org/its/index.cgi/?findid=9052
https://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| openldap | CVE-2020-12243 | MEDIUM | 2.4.44-21.el7_6 | 2.4.44-22.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html
https://access.redhat.com/security/cve/CVE-2020-12243
https://bugs.openldap.org/show_bug.cgi?id=9202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243
https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES
https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440
https://linux.oracle.com/cve/CVE-2020-12243.html
https://linux.oracle.com/errata/ELSA-2020-4041.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html
https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/FUOYA6YCHBXMLANBJMSO22JD2NB22WGC/
https://security.netapp.com/advisory/ntap-20200511-0003/
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4352-1
https://ubuntu.com/security/notices/USN-4352-2
https://usn.ubuntu.com/4352-1/
https://usn.ubuntu.com/4352-2/
https://www.debian.org/security/2020/dsa-4666
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| openldap | CVE-2020-25692 | MEDIUM | 2.4.44-21.el7_6 | 2.4.44-23.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25692
https://bugzilla.redhat.com/show_bug.cgi?id=1894567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692
https://linux.oracle.com/cve/CVE-2020-25692.html
https://linux.oracle.com/errata/ELSA-2021-1389.html
https://nvd.nist.gov/vuln/detail/CVE-2020-25692
https://security.netapp.com/advisory/ntap-20210108-0006/
https://ubuntu.com/security/notices/USN-4622-1
https://ubuntu.com/security/notices/USN-4622-2
| +| openldap | CVE-2020-25709 | MEDIUM | 2.4.44-21.el7_6 | 2.4.44-25.el7_9 |
Expand...http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2020-25709
https://bugzilla.redhat.com/show_bug.cgi?id=1899675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709
https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c
https://linux.oracle.com/cve/CVE-2020-25709.html
https://linux.oracle.com/errata/ELSA-2022-0621.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html
https://security.netapp.com/advisory/ntap-20210716-0003/
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-4634-1
https://ubuntu.com/security/notices/USN-4634-2
https://www.debian.org/security/2020/dsa-4792
| +| openldap | CVE-2020-25710 | MEDIUM | 2.4.44-21.el7_6 | 2.4.44-25.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2020-25710
https://bugzilla.redhat.com/show_bug.cgi?id=1899678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710
https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c
https://linux.oracle.com/cve/CVE-2020-25710.html
https://linux.oracle.com/errata/ELSA-2022-0621.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html
https://security.netapp.com/advisory/ntap-20210716-0003/
https://ubuntu.com/security/notices/USN-4634-1
https://ubuntu.com/security/notices/USN-4634-2
https://www.debian.org/security/2020/dsa-4792
| +| openldap | CVE-2020-36221 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36221
https://bugs.openldap.org/show_bug.cgi?id=9404
https://bugs.openldap.org/show_bug.cgi?id=9424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36221
https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31
https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36221
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
| +| openldap | CVE-2020-36222 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36222
https://bugs.openldap.org/show_bug.cgi?id=9406
https://bugs.openldap.org/show_bug.cgi?id=9407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36222
https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0
https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed
https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36222
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
| +| openldap | CVE-2020-36223 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36223
https://bugs.openldap.org/show_bug.cgi?id=9408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36223
https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36223
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
| +| openldap | CVE-2020-36224 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36224
https://bugs.openldap.org/show_bug.cgi?id=9409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36224
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36224
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
| +| openldap | CVE-2020-36225 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36225
https://bugs.openldap.org/show_bug.cgi?id=9412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36225
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36225
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
| +| openldap | CVE-2020-36226 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36226
https://bugs.openldap.org/show_bug.cgi?id=9413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36226
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36226
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
| +| openldap | CVE-2020-36227 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36227
https://bugs.openldap.org/show_bug.cgi?id=9428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36227
https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36227
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
| +| openldap | CVE-2020-36228 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36228
https://bugs.openldap.org/show_bug.cgi?id=9427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36228
https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36228
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
| +| openldap | CVE-2020-36229 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36229
https://bugs.openldap.org/show_bug.cgi?id=9425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36229
https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36229
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
| +| openldap | CVE-2020-36230 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36230
https://bugs.openldap.org/show_bug.cgi?id=9423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36230
https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36230
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
| +| openldap | CVE-2021-27212 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27212
https://bugs.openldap.org/show_bug.cgi?id=9454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212
https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0
https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27212
https://security.netapp.com/advisory/ntap-20210319-0005/
https://ubuntu.com/security/notices/USN-4744-1
https://www.debian.org/security/2021/dsa-4860
| +| openldap | CVE-2022-29155 | MEDIUM | 2.4.44-21.el7_6 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| openldap | CVE-2016-4984 | LOW | 2.4.44-21.el7_6 | |
Expand...https://access.redhat.com/security/cve/CVE-2016-4984
https://bugzilla.redhat.com/show_bug.cgi?id=1346120
| +| openldap | CVE-2020-15719 | LOW | 2.4.44-21.el7_6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| openssh | CVE-2018-20685 | MEDIUM | 7.4p1-21.el7 | |
Expand...http://www.securityfocus.com/bid/106531
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2018-20685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685
https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h
https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
https://linux.oracle.com/cve/CVE-2018-20685.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.gentoo.org/glsa/202007-53
https://security.netapp.com/advisory/ntap-20190215-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| openssh | CVE-2019-6111 | MEDIUM | 7.4p1-21.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
http://www.openwall.com/lists/oss-security/2019/04/18/1
http://www.securityfocus.com/bid/106741
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6111
https://bugzilla.redhat.com/show_bug.cgi?id=1677794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6111.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://ubuntu.com/security/notices/USN-3885-2
https://usn.ubuntu.com/3885-1/
https://usn.ubuntu.com/3885-2/
https://www.debian.org/security/2019/dsa-4387
https://www.exploit-db.com/exploits/46193/
https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| openssh | CVE-2020-14145 | MEDIUM | 7.4p1-21.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://access.redhat.com/security/cve/CVE-2020-14145
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14145
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
| +| openssh | CVE-2020-15778 | MEDIUM | 7.4p1-21.el7 | |
Expand...https://access.redhat.com/articles/5284081
https://access.redhat.com/security/cve/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778/
https://news.ycombinator.com/item?id=25005567
https://nvd.nist.gov/vuln/detail/CVE-2020-15778
https://security.netapp.com/advisory/ntap-20200731-0007/
https://www.openssh.com/security.html
| +| openssh | CVE-2021-41617 | MEDIUM | 7.4p1-21.el7 | 7.4p1-22.el7_9 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json
https://access.redhat.com/security/cve/CVE-2021-41617
https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://errata.almalinux.org/8/ALSA-2022-2013.html
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2022-2013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://nvd.nist.gov/vuln/detail/CVE-2021-41617
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| openssh | CVE-2016-20012 | LOW | 7.4p1-21.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2016-20012
https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265
https://github.com/openssh/openssh-portable/pull/270
https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097
https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185
https://nvd.nist.gov/vuln/detail/CVE-2016-20012
https://rushter.com/blog/public-ssh-keys/
https://security.netapp.com/advisory/ntap-20211014-0005/
https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak
https://www.openwall.com/lists/oss-security/2018/08/24/1
| +| openssh | CVE-2018-15919 | LOW | 7.4p1-21.el7 | |
Expand...http://seclists.org/oss-sec/2018/q3/180
http://www.securityfocus.com/bid/105163
https://access.redhat.com/security/cve/CVE-2018-15919
https://security.netapp.com/advisory/ntap-20181221-0001/
| +| openssh | CVE-2019-6109 | LOW | 7.4p1-21.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6109.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| openssh | CVE-2019-6110 | LOW | 7.4p1-21.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-6110
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://www.exploit-db.com/exploits/46193/
| +| openssh-clients | CVE-2018-20685 | MEDIUM | 7.4p1-21.el7 | |
Expand...http://www.securityfocus.com/bid/106531
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2018-20685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685
https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h
https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
https://linux.oracle.com/cve/CVE-2018-20685.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.gentoo.org/glsa/202007-53
https://security.netapp.com/advisory/ntap-20190215-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| openssh-clients | CVE-2019-6111 | MEDIUM | 7.4p1-21.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
http://www.openwall.com/lists/oss-security/2019/04/18/1
http://www.securityfocus.com/bid/106741
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6111
https://bugzilla.redhat.com/show_bug.cgi?id=1677794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6111.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://ubuntu.com/security/notices/USN-3885-2
https://usn.ubuntu.com/3885-1/
https://usn.ubuntu.com/3885-2/
https://www.debian.org/security/2019/dsa-4387
https://www.exploit-db.com/exploits/46193/
https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| openssh-clients | CVE-2020-14145 | MEDIUM | 7.4p1-21.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://access.redhat.com/security/cve/CVE-2020-14145
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14145
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
| +| openssh-clients | CVE-2020-15778 | MEDIUM | 7.4p1-21.el7 | |
Expand...https://access.redhat.com/articles/5284081
https://access.redhat.com/security/cve/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778/
https://news.ycombinator.com/item?id=25005567
https://nvd.nist.gov/vuln/detail/CVE-2020-15778
https://security.netapp.com/advisory/ntap-20200731-0007/
https://www.openssh.com/security.html
| +| openssh-clients | CVE-2021-41617 | MEDIUM | 7.4p1-21.el7 | 7.4p1-22.el7_9 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json
https://access.redhat.com/security/cve/CVE-2021-41617
https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://errata.almalinux.org/8/ALSA-2022-2013.html
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2022-2013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://nvd.nist.gov/vuln/detail/CVE-2021-41617
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| openssh-clients | CVE-2016-20012 | LOW | 7.4p1-21.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2016-20012
https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265
https://github.com/openssh/openssh-portable/pull/270
https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097
https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185
https://nvd.nist.gov/vuln/detail/CVE-2016-20012
https://rushter.com/blog/public-ssh-keys/
https://security.netapp.com/advisory/ntap-20211014-0005/
https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak
https://www.openwall.com/lists/oss-security/2018/08/24/1
| +| openssh-clients | CVE-2018-15919 | LOW | 7.4p1-21.el7 | |
Expand...http://seclists.org/oss-sec/2018/q3/180
http://www.securityfocus.com/bid/105163
https://access.redhat.com/security/cve/CVE-2018-15919
https://security.netapp.com/advisory/ntap-20181221-0001/
| +| openssh-clients | CVE-2019-6109 | LOW | 7.4p1-21.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6109.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| openssh-clients | CVE-2019-6110 | LOW | 7.4p1-21.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-6110
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://www.exploit-db.com/exploits/46193/
| +| openssh-server | CVE-2018-20685 | MEDIUM | 7.4p1-21.el7 | |
Expand...http://www.securityfocus.com/bid/106531
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2018-20685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685
https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h
https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
https://linux.oracle.com/cve/CVE-2018-20685.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.gentoo.org/glsa/202007-53
https://security.netapp.com/advisory/ntap-20190215-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| openssh-server | CVE-2019-6111 | MEDIUM | 7.4p1-21.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
http://www.openwall.com/lists/oss-security/2019/04/18/1
http://www.securityfocus.com/bid/106741
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6111
https://bugzilla.redhat.com/show_bug.cgi?id=1677794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6111.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://ubuntu.com/security/notices/USN-3885-2
https://usn.ubuntu.com/3885-1/
https://usn.ubuntu.com/3885-2/
https://www.debian.org/security/2019/dsa-4387
https://www.exploit-db.com/exploits/46193/
https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| openssh-server | CVE-2020-14145 | MEDIUM | 7.4p1-21.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://access.redhat.com/security/cve/CVE-2020-14145
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14145
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
| +| openssh-server | CVE-2020-15778 | MEDIUM | 7.4p1-21.el7 | |
Expand...https://access.redhat.com/articles/5284081
https://access.redhat.com/security/cve/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778/
https://news.ycombinator.com/item?id=25005567
https://nvd.nist.gov/vuln/detail/CVE-2020-15778
https://security.netapp.com/advisory/ntap-20200731-0007/
https://www.openssh.com/security.html
| +| openssh-server | CVE-2021-41617 | MEDIUM | 7.4p1-21.el7 | 7.4p1-22.el7_9 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json
https://access.redhat.com/security/cve/CVE-2021-41617
https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://errata.almalinux.org/8/ALSA-2022-2013.html
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2022-2013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://nvd.nist.gov/vuln/detail/CVE-2021-41617
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| openssh-server | CVE-2016-20012 | LOW | 7.4p1-21.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2016-20012
https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265
https://github.com/openssh/openssh-portable/pull/270
https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097
https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185
https://nvd.nist.gov/vuln/detail/CVE-2016-20012
https://rushter.com/blog/public-ssh-keys/
https://security.netapp.com/advisory/ntap-20211014-0005/
https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak
https://www.openwall.com/lists/oss-security/2018/08/24/1
| +| openssh-server | CVE-2018-15919 | LOW | 7.4p1-21.el7 | |
Expand...http://seclists.org/oss-sec/2018/q3/180
http://www.securityfocus.com/bid/105163
https://access.redhat.com/security/cve/CVE-2018-15919
https://security.netapp.com/advisory/ntap-20181221-0001/
| +| openssh-server | CVE-2019-6109 | LOW | 7.4p1-21.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6109.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| +| openssh-server | CVE-2019-6110 | LOW | 7.4p1-21.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-6110
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://www.exploit-db.com/exploits/46193/
| +| openssl-devel | CVE-2020-1971 | HIGH | 1:1.0.2k-19.el7 | 1:1.0.2k-21.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2021/09/14/2
https://access.redhat.com/security/cve/CVE-2020-1971
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676
https://linux.oracle.com/cve/CVE-2020-1971.html
https://linux.oracle.com/errata/ELSA-2021-9150.html
https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/
https://nvd.nist.gov/vuln/detail/CVE-2020-1971
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc
https://security.gentoo.org/glsa/202012-13
https://security.netapp.com/advisory/ntap-20201218-0005/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4662-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2020/dsa-4807
https://www.openssl.org/news/secadv/20201208.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
| +| openssl-devel | CVE-2022-0778 | HIGH | 1:1.0.2k-19.el7 | 1:1.0.2k-25.el7_9 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
| +| openssl-devel | CVE-2015-2808 | MEDIUM | 1:1.0.2k-19.el7 | |
Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
| +| openssl-devel | CVE-2019-1547 | MEDIUM | 1:1.0.2k-19.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1547
https://arxiv.org/abs/1909.01785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=21c856b75d81eff61aa63b4f036bb64a85bf6d46
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30c22fa8b1d840036b8e203585738df62a03cec8
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1547.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://security.netapp.com/advisory/ntap-20200122-0002/
https://security.netapp.com/advisory/ntap-20200416-0003/
https://support.f5.com/csp/article/K73422160?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-08
https://www.tenable.com/security/tns-2019-09
| +| openssl-devel | CVE-2021-23840 | MEDIUM | 1:1.0.2k-19.el7 | 1:1.0.2k-22.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2021-23840
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-23840.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://rustsec.org/advisories/RUSTSEC-2021-0057.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
| +| openssl-devel | CVE-2021-23841 | MEDIUM | 1:1.0.2k-19.el7 | 1:1.0.2k-22.el7_9 |
Expand...http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2021-23841
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://rustsec.org/advisories/RUSTSEC-2021-0058.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
| +| openssl-devel | CVE-2021-3712 | MEDIUM | 1:1.0.2k-19.el7 | 1:1.0.2k-23.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| openssl-devel | CVE-2022-1292 | MEDIUM | 1:1.0.2k-19.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| openssl-devel | CVE-2022-1434 | MEDIUM | 1:1.0.2k-19.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1434
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1434
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7d56a74a96828985db7354a55227a511615f732b
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://rustsec.org/advisories/RUSTSEC-2022-0026.html
https://ubuntu.com/security/notices/USN-5402-1
https://www.openssl.org/news/secadv/20220503.txt
| +| openssl-devel | CVE-2019-1551 | LOW | 1:1.0.2k-19.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98
https://github.com/openssl/openssl/pull/10575
https://linux.oracle.com/cve/CVE-2019-1551.html
https://linux.oracle.com/errata/ELSA-2020-4514.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/
https://seclists.org/bugtraq/2019/Dec/39
https://seclists.org/bugtraq/2019/Dec/46
https://security.gentoo.org/glsa/202004-10
https://security.netapp.com/advisory/ntap-20191210-0001/
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4594
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20191206.txt
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.tenable.com/security/tns-2019-09
https://www.tenable.com/security/tns-2020-03
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-10
| +| openssl-devel | CVE-2019-1563 | LOW | 1:1.0.2k-19.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=631f94db0065c78181ca9ba5546ebc8bb3884b97
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1563.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://support.f5.com/csp/article/K97324400?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-09
| +| openssl-devel | CVE-2020-1968 | LOW | 1:1.0.2k-19.el7 | |
Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al.
Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf
https://access.redhat.com/security/cve/CVE-2020-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968
https://lists.debian.org/debian-lts-announce/2020/09/msg00016.html
https://security.netapp.com/advisory/ntap-20200911-0004/
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4504-1/
https://www.openssl.org/news/secadv/20200909.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| openssl-devel | CVE-2021-3601 | LOW | 1:1.0.2k-19.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3601
| +| openssl-libs | CVE-2020-1971 | HIGH | 1:1.0.2k-19.el7 | 1:1.0.2k-21.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2021/09/14/2
https://access.redhat.com/security/cve/CVE-2020-1971
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676
https://linux.oracle.com/cve/CVE-2020-1971.html
https://linux.oracle.com/errata/ELSA-2021-9150.html
https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/
https://nvd.nist.gov/vuln/detail/CVE-2020-1971
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc
https://security.gentoo.org/glsa/202012-13
https://security.netapp.com/advisory/ntap-20201218-0005/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4662-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2020/dsa-4807
https://www.openssl.org/news/secadv/20201208.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
| +| openssl-libs | CVE-2022-0778 | HIGH | 1:1.0.2k-19.el7 | 1:1.0.2k-25.el7_9 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
| +| openssl-libs | CVE-2015-2808 | MEDIUM | 1:1.0.2k-19.el7 | |
Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
| +| openssl-libs | CVE-2019-1547 | MEDIUM | 1:1.0.2k-19.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1547
https://arxiv.org/abs/1909.01785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=21c856b75d81eff61aa63b4f036bb64a85bf6d46
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30c22fa8b1d840036b8e203585738df62a03cec8
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1547.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://security.netapp.com/advisory/ntap-20200122-0002/
https://security.netapp.com/advisory/ntap-20200416-0003/
https://support.f5.com/csp/article/K73422160?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-08
https://www.tenable.com/security/tns-2019-09
| +| openssl-libs | CVE-2021-23840 | MEDIUM | 1:1.0.2k-19.el7 | 1:1.0.2k-22.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2021-23840
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-23840.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://rustsec.org/advisories/RUSTSEC-2021-0057.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
| +| openssl-libs | CVE-2021-23841 | MEDIUM | 1:1.0.2k-19.el7 | 1:1.0.2k-22.el7_9 |
Expand...http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2021-23841
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://rustsec.org/advisories/RUSTSEC-2021-0058.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
| +| openssl-libs | CVE-2021-3712 | MEDIUM | 1:1.0.2k-19.el7 | 1:1.0.2k-23.el7_9 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| openssl-libs | CVE-2022-1292 | MEDIUM | 1:1.0.2k-19.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| openssl-libs | CVE-2022-1434 | MEDIUM | 1:1.0.2k-19.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1434
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1434
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7d56a74a96828985db7354a55227a511615f732b
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://rustsec.org/advisories/RUSTSEC-2022-0026.html
https://ubuntu.com/security/notices/USN-5402-1
https://www.openssl.org/news/secadv/20220503.txt
| +| openssl-libs | CVE-2019-1551 | LOW | 1:1.0.2k-19.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98
https://github.com/openssl/openssl/pull/10575
https://linux.oracle.com/cve/CVE-2019-1551.html
https://linux.oracle.com/errata/ELSA-2020-4514.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/
https://seclists.org/bugtraq/2019/Dec/39
https://seclists.org/bugtraq/2019/Dec/46
https://security.gentoo.org/glsa/202004-10
https://security.netapp.com/advisory/ntap-20191210-0001/
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4594
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20191206.txt
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.tenable.com/security/tns-2019-09
https://www.tenable.com/security/tns-2020-03
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-10
| +| openssl-libs | CVE-2019-1563 | LOW | 1:1.0.2k-19.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=631f94db0065c78181ca9ba5546ebc8bb3884b97
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1563.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://support.f5.com/csp/article/K97324400?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-09
| +| openssl-libs | CVE-2020-1968 | LOW | 1:1.0.2k-19.el7 | |
Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al.
Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf
https://access.redhat.com/security/cve/CVE-2020-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968
https://lists.debian.org/debian-lts-announce/2020/09/msg00016.html
https://security.netapp.com/advisory/ntap-20200911-0004/
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4504-1/
https://www.openssl.org/news/secadv/20200909.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| openssl-libs | CVE-2021-3601 | LOW | 1:1.0.2k-19.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3601
| +| p11-kit | CVE-2020-29361 | MEDIUM | 0.23.5-3.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-29361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2
https://linux.oracle.com/cve/CVE-2020-29361.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29361
https://ubuntu.com/security/notices/USN-4677-1
https://ubuntu.com/security/notices/USN-4677-2
https://www.debian.org/security/2021/dsa-4822
| +| p11-kit | CVE-2020-29362 | MEDIUM | 0.23.5-3.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-29362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc
https://linux.oracle.com/cve/CVE-2020-29362.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29362
https://ubuntu.com/security/notices/USN-4677-1
https://www.debian.org/security/2021/dsa-4822
| +| p11-kit-trust | CVE-2020-29361 | MEDIUM | 0.23.5-3.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-29361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2
https://linux.oracle.com/cve/CVE-2020-29361.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29361
https://ubuntu.com/security/notices/USN-4677-1
https://ubuntu.com/security/notices/USN-4677-2
https://www.debian.org/security/2021/dsa-4822
| +| p11-kit-trust | CVE-2020-29362 | MEDIUM | 0.23.5-3.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-29362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc
https://linux.oracle.com/cve/CVE-2020-29362.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29362
https://ubuntu.com/security/notices/USN-4677-1
https://www.debian.org/security/2021/dsa-4822
| +| pcre | CVE-2017-6004 | MEDIUM | 8.32-17.el7 | |
Expand...http://www.securityfocus.com/bid/96295
http://www.securitytracker.com/id/1037850
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-6004
https://bugs.exim.org/show_bug.cgi?id=2035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201706-11
https://vcs.pcre.org/pcre/code/trunk/pcre_jit_compile.c?r1=1676&r2=1680&view=patch
| +| pcre | CVE-2017-7186 | MEDIUM | 8.32-17.el7 | |
Expand...http://www.securityfocus.com/bid/97030
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7186
https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/
https://bugs.exim.org/show_bug.cgi?id=2052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186
https://security.gentoo.org/glsa/201710-09
https://security.gentoo.org/glsa/201710-25
https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date
https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date
https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date
https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date
| +| pcre | CVE-2015-8382 | LOW | 8.32-17.el7 | |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=c351b47ce85a3a147cfa801fa9f0149ab4160834
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510
http://www.openwall.com/lists/oss-security/2015/08/04/2
http://www.openwall.com/lists/oss-security/2015/08/04/3
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/76157
https://access.redhat.com/security/cve/CVE-2015-8382
https://bto.bluecoat.com/security-advisory/sa128
https://bugs.exim.org/show_bug.cgi?id=1537
https://bugzilla.redhat.com/show_bug.cgi?id=1187225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382
https://ubuntu.com/security/notices/USN-2943-1
| +| pcre | CVE-2017-11164 | LOW | 8.32-17.el7 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| pcre | CVE-2017-7244 | LOW | 8.32-17.el7 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7244
https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244
https://security.gentoo.org/glsa/201710-25
| +| pcre | CVE-2017-7245 | LOW | 8.32-17.el7 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| pcre | CVE-2017-7246 | LOW | 8.32-17.el7 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| pcre | CVE-2020-14155 | LOW | 8.32-17.el7 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
| +| pcre-devel | CVE-2017-6004 | MEDIUM | 8.32-17.el7 | |
Expand...http://www.securityfocus.com/bid/96295
http://www.securitytracker.com/id/1037850
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-6004
https://bugs.exim.org/show_bug.cgi?id=2035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201706-11
https://vcs.pcre.org/pcre/code/trunk/pcre_jit_compile.c?r1=1676&r2=1680&view=patch
| +| pcre-devel | CVE-2017-7186 | MEDIUM | 8.32-17.el7 | |
Expand...http://www.securityfocus.com/bid/97030
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7186
https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/
https://bugs.exim.org/show_bug.cgi?id=2052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186
https://security.gentoo.org/glsa/201710-09
https://security.gentoo.org/glsa/201710-25
https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date
https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date
https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date
https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date
| +| pcre-devel | CVE-2015-8382 | LOW | 8.32-17.el7 | |
Expand...http://git.php.net/?p=php-src.git;a=commit;h=c351b47ce85a3a147cfa801fa9f0149ab4160834
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510
http://www.openwall.com/lists/oss-security/2015/08/04/2
http://www.openwall.com/lists/oss-security/2015/08/04/3
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/76157
https://access.redhat.com/security/cve/CVE-2015-8382
https://bto.bluecoat.com/security-advisory/sa128
https://bugs.exim.org/show_bug.cgi?id=1537
https://bugzilla.redhat.com/show_bug.cgi?id=1187225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382
https://ubuntu.com/security/notices/USN-2943-1
| +| pcre-devel | CVE-2017-11164 | LOW | 8.32-17.el7 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| pcre-devel | CVE-2017-7244 | LOW | 8.32-17.el7 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7244
https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244
https://security.gentoo.org/glsa/201710-25
| +| pcre-devel | CVE-2017-7245 | LOW | 8.32-17.el7 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| pcre-devel | CVE-2017-7246 | LOW | 8.32-17.el7 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| pcre-devel | CVE-2020-14155 | LOW | 8.32-17.el7 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
| +| perl | CVE-2015-8853 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
| +| perl | CVE-2016-1238 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab
http://www.debian.org/security/2016/dsa-3628
http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html
http://www.securityfocus.com/bid/92136
http://www.securitytracker.com/id/1036440
https://access.redhat.com/security/cve/CVE-2016-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/
https://rt.perl.org/Public/Bug/Display.html?id=127834
https://security.gentoo.org/glsa/201701-75
https://security.gentoo.org/glsa/201812-07
| +| perl | CVE-2016-2381 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
| +| perl | CVE-2016-6185 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
| +| perl | CVE-2020-10543 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed
https://linux.oracle.com/cve/CVE-2020-10543.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| perl | CVE-2020-10878 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8
https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c
https://linux.oracle.com/cve/CVE-2020-10878.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| perl | CVE-2020-12723 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-12723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/Perl/perl5/issues/16947
https://github.com/Perl/perl5/issues/17743
https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a
https://linux.oracle.com/cve/CVE-2020-12723.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| perl | CVE-2020-16156 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl | CVE-2013-7422 | LOW | 4:5.16.3-295.el7 | |
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
| +| perl-Data-Dumper | CVE-2014-4330 | LOW | 2.145-3.el7 | |
Expand...http://advisories.mageia.org/MGASA-2014-0406.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html
http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html
http://seclists.org/fulldisclosure/2014/Sep/84
http://seclists.org/oss-sec/2014/q3/692
http://secunia.com/advisories/61441
http://secunia.com/advisories/61961
http://www.mandriva.com/security/advisories?name=MDVSA-2015:136
http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html
http://www.securityfocus.com/archive/1/533543/100/0/threaded
http://www.securityfocus.com/bid/70142
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2014-4330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330
https://exchange.xforce.ibmcloud.com/vulnerabilities/96216
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://metacpan.org/pod/distribution/Data-Dumper/Changes
https://ubuntu.com/security/notices/USN-2916-1
https://www.lsexperts.de/advisories/lse-2014-06-10.txt
| +| perl-File-Path | CVE-2017-6512 | LOW | 2.09-2.el7 | |
Expand...http://cpansearch.perl.org/src/JKEENAN/File-Path-2.13/Changes
http://security.cucumberlinux.com/security/details.php?id=153
http://www.debian.org/security/2017/dsa-3873
http://www.securityfocus.com/bid/99180
http://www.securitytracker.com/id/1038610
https://access.redhat.com/security/cve/CVE-2017-6512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512
https://rt.cpan.org/Ticket/Display.html?id=121951
https://security.gentoo.org/glsa/201709-12
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
| +| perl-Git | CVE-2022-25648 | CRITICAL | 1.8.3.1-23.el7_8 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-25648
https://github.com/advisories/GHSA-69p6-wvmq-27gg
https://github.com/ruby-git/ruby-git/pull/569
https://github.com/ruby-git/ruby-git/releases/tag/v1.11.0
https://nvd.nist.gov/vuln/detail/CVE-2022-25648
https://snyk.io/vuln/SNYK-RUBY-GIT-2421270
| +| perl-Git | CVE-2017-14867 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...http://www.openwall.com/lists/oss-security/2017/09/26/9
http://www.securityfocus.com/bid/101060
http://www.securitytracker.com/id/1039431
https://access.redhat.com/security/cve/CVE-2017-14867
https://bugs.debian.org/876854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14867
https://lists.debian.org/debian-security-announce/2017/msg00246.html
https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/T/#u
https://ubuntu.com/security/notices/USN-3438-1
https://www.debian.org/security/2017/dsa-3984
| +| perl-Git | CVE-2018-1000021 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://access.redhat.com/security/cve/CVE-2018-1000021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| +| perl-Git | CVE-2019-1348 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/errata/RHSA-2020:0228
https://access.redhat.com/security/cve/CVE-2019-1348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348
https://github.com/git/git/security/advisories/GHSA-2pw3-gwg9-8pqr
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://linux.oracle.com/cve/CVE-2019-1348.html
https://linux.oracle.com/errata/ELSA-2019-4356.html
https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://security.gentoo.org/glsa/202003-42
https://support.apple.com/kb/HT210729
https://ubuntu.com/security/notices/USN-4220-1
| +| perl-Git | CVE-2019-1349 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/errata/RHSA-2020:0228
https://access.redhat.com/security/cve/CVE-2019-1349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349
https://github.com/git/git/security/advisories/GHSA-4qvh-qvv7-frc7
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://linux.oracle.com/cve/CVE-2019-1349.html
https://linux.oracle.com/errata/ELSA-2019-4356.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://ubuntu.com/security/notices/USN-4220-1
| +| perl-Git | CVE-2021-21300 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html
http://seclists.org/fulldisclosure/2021/Apr/60
http://www.openwall.com/lists/oss-security/2021/03/09/3
https://access.redhat.com/security/cve/CVE-2021-21300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300
https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks
https://git-scm.com/docs/gitattributes#_filter
https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592
https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/
https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/
https://security.gentoo.org/glsa/202104-01
https://support.apple.com/kb/HT212320
https://ubuntu.com/security/notices/USN-4761-1
| +| perl-Git | CVE-2021-40330 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-40330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330
https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473
https://github.com/git/git/compare/v2.30.0...v2.30.1
https://nvd.nist.gov/vuln/detail/CVE-2021-40330
https://ubuntu.com/security/notices/USN-5076-1
| +| perl-Git | CVE-2022-24765 | MEDIUM | 1.8.3.1-23.el7_8 | |
Expand...http://seclists.org/fulldisclosure/2022/May/31
http://www.openwall.com/lists/oss-security/2022/04/12/7
https://access.redhat.com/security/cve/CVE-2022-24765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash
https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode
https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/
https://support.apple.com/kb/HT213261
https://ubuntu.com/security/notices/USN-5376-1
https://ubuntu.com/security/notices/USN-5376-2
https://ubuntu.com/security/notices/USN-5376-3
| +| perl-Git | CVE-2017-15298 | LOW | 1.8.3.1-23.el7_8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2017-15298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298
https://github.com/Katee/git-bomb
https://kate.io/blog/git-bomb/
https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2
https://ubuntu.com/security/notices/USN-3829-1
https://usn.ubuntu.com/3829-1/
| +| perl-Pod-Escapes | CVE-2015-8853 | MEDIUM | 1:1.04-295.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
| +| perl-Pod-Escapes | CVE-2016-1238 | MEDIUM | 1:1.04-295.el7 | |
Expand...http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab
http://www.debian.org/security/2016/dsa-3628
http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html
http://www.securityfocus.com/bid/92136
http://www.securitytracker.com/id/1036440
https://access.redhat.com/security/cve/CVE-2016-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/
https://rt.perl.org/Public/Bug/Display.html?id=127834
https://security.gentoo.org/glsa/201701-75
https://security.gentoo.org/glsa/201812-07
| +| perl-Pod-Escapes | CVE-2016-2381 | MEDIUM | 1:1.04-295.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
| +| perl-Pod-Escapes | CVE-2016-6185 | MEDIUM | 1:1.04-295.el7 | |
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
| +| perl-Pod-Escapes | CVE-2020-10543 | MEDIUM | 1:1.04-295.el7 | 1:1.04-299.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed
https://linux.oracle.com/cve/CVE-2020-10543.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| perl-Pod-Escapes | CVE-2020-10878 | MEDIUM | 1:1.04-295.el7 | 1:1.04-299.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8
https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c
https://linux.oracle.com/cve/CVE-2020-10878.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| perl-Pod-Escapes | CVE-2020-12723 | MEDIUM | 1:1.04-295.el7 | 1:1.04-299.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-12723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/Perl/perl5/issues/16947
https://github.com/Perl/perl5/issues/17743
https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a
https://linux.oracle.com/cve/CVE-2020-12723.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| perl-Pod-Escapes | CVE-2020-16156 | MEDIUM | 1:1.04-295.el7 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-Pod-Escapes | CVE-2013-7422 | LOW | 1:1.04-295.el7 | |
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
| +| perl-libs | CVE-2015-8853 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
| +| perl-libs | CVE-2016-1238 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab
http://www.debian.org/security/2016/dsa-3628
http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html
http://www.securityfocus.com/bid/92136
http://www.securitytracker.com/id/1036440
https://access.redhat.com/security/cve/CVE-2016-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/
https://rt.perl.org/Public/Bug/Display.html?id=127834
https://security.gentoo.org/glsa/201701-75
https://security.gentoo.org/glsa/201812-07
| +| perl-libs | CVE-2016-2381 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
| +| perl-libs | CVE-2016-6185 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
| +| perl-libs | CVE-2020-10543 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed
https://linux.oracle.com/cve/CVE-2020-10543.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| perl-libs | CVE-2020-10878 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8
https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c
https://linux.oracle.com/cve/CVE-2020-10878.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| perl-libs | CVE-2020-12723 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-12723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/Perl/perl5/issues/16947
https://github.com/Perl/perl5/issues/17743
https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a
https://linux.oracle.com/cve/CVE-2020-12723.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| perl-libs | CVE-2020-16156 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-libs | CVE-2013-7422 | LOW | 4:5.16.3-295.el7 | |
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
| +| perl-macros | CVE-2015-8853 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
| +| perl-macros | CVE-2016-1238 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab
http://www.debian.org/security/2016/dsa-3628
http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html
http://www.securityfocus.com/bid/92136
http://www.securitytracker.com/id/1036440
https://access.redhat.com/security/cve/CVE-2016-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/
https://rt.perl.org/Public/Bug/Display.html?id=127834
https://security.gentoo.org/glsa/201701-75
https://security.gentoo.org/glsa/201812-07
| +| perl-macros | CVE-2016-2381 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
| +| perl-macros | CVE-2016-6185 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
| +| perl-macros | CVE-2020-10543 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed
https://linux.oracle.com/cve/CVE-2020-10543.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| perl-macros | CVE-2020-10878 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8
https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c
https://linux.oracle.com/cve/CVE-2020-10878.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| perl-macros | CVE-2020-12723 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-12723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/Perl/perl5/issues/16947
https://github.com/Perl/perl5/issues/17743
https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a
https://linux.oracle.com/cve/CVE-2020-12723.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| perl-macros | CVE-2020-16156 | MEDIUM | 4:5.16.3-295.el7 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-macros | CVE-2013-7422 | LOW | 4:5.16.3-295.el7 | |
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
| +| procps-ng | CVE-2018-1121 | LOW | 3.3.10-26.el7 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1121
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| procps-ng | CVE-2018-1123 | LOW | 3.3.10-26.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1123
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://security.gentoo.org/glsa/201805-14
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-3
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-3/
https://www.debian.org/security/2018/dsa-4208
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| procps-ng | CVE-2018-1125 | LOW | 3.3.10-26.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1125
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-3
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-3/
https://www.debian.org/security/2018/dsa-4208
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| python | CVE-2013-1664 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
http://bugs.python.org/issue17239
http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
http://rhn.redhat.com/errata/RHSA-2013-0657.html
http://rhn.redhat.com/errata/RHSA-2013-0658.html
http://rhn.redhat.com/errata/RHSA-2013-0670.html
http://ubuntu.com/usn/usn-1757-1
http://www.openwall.com/lists/oss-security/2013/02/19/2
http://www.openwall.com/lists/oss-security/2013/02/19/4
https://access.redhat.com/security/cve/CVE-2013-1664
https://bugs.launchpad.net/nova/+bug/1100282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1664
https://ubuntu.com/security/notices/USN-1730-1
https://ubuntu.com/security/notices/USN-1731-1
https://ubuntu.com/security/notices/USN-1734-1
https://ubuntu.com/security/notices/USN-1757-1
https://www.djangoproject.com/weblog/2013/feb/19/security/
| +| python | CVE-2013-1665 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
http://bugs.python.org/issue17239
http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
http://rhn.redhat.com/errata/RHSA-2013-0657.html
http://rhn.redhat.com/errata/RHSA-2013-0658.html
http://rhn.redhat.com/errata/RHSA-2013-0670.html
http://ubuntu.com/usn/usn-1757-1
http://www.debian.org/security/2013/dsa-2634
http://www.openwall.com/lists/oss-security/2013/02/19/2
http://www.openwall.com/lists/oss-security/2013/02/19/4
https://access.redhat.com/security/cve/CVE-2013-1665
https://bugs.launchpad.net/keystone/+bug/1100279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1665
https://ubuntu.com/security/notices/USN-1730-1
https://ubuntu.com/security/notices/USN-1757-1
https://www.djangoproject.com/weblog/2013/feb/19/security/
| +| python | CVE-2013-7040 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://access.redhat.com/security/cve/CVE-2013-7040
https://support.apple.com/kb/HT205031
| +| python | CVE-2017-1000158 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.debian.org/security/2018/dsa-4307
| +| python | CVE-2018-20852 | MEDIUM | 2.7.5-86.el7 | 2.7.5-88.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/errata/RHSA-2019:3948
https://access.redhat.com/security/cve/CVE-2018-20852
https://bugs.python.org/issue35121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://linux.oracle.com/cve/CVE-2018-20852.html
https://linux.oracle.com/errata/ELSA-2020-1764.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00040.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://python-security.readthedocs.io/vuln/cookie-domain-check.html
https://security.gentoo.org/glsa/202003-26
https://ubuntu.com/security/notices/USN-4127-1
https://ubuntu.com/security/notices/USN-4127-2
https://usn.ubuntu.com/4127-1/
https://usn.ubuntu.com/4127-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| python | CVE-2019-16056 | MEDIUM | 2.7.5-86.el7 | 2.7.5-88.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/errata/RHSA-2019:3948
https://access.redhat.com/security/cve/CVE-2019-16056
https://bugs.python.org/issue34155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16056
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9
https://linux.oracle.com/cve/CVE-2019-16056.html
https://linux.oracle.com/errata/ELSA-2020-1764.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/09/msg00018.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00019.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4KZEFP6E4YPYB52AF4WXCUDSGQOTF37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QASRD4E2G65GGEHYKVHYCXB2XWAGTNL4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QP46PQSUKYPGWTADQ67NOV3BUN6JM34Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDQQ56P7ZZR64XV5DUVWNSNXKKEXUG2J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://security.netapp.com/advisory/ntap-20190926-0005/
https://ubuntu.com/security/notices/USN-4151-1
https://ubuntu.com/security/notices/USN-4151-2
https://usn.ubuntu.com/4151-1/
https://usn.ubuntu.com/4151-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
| +| python | CVE-2019-16935 | MEDIUM | 2.7.5-86.el7 | 2.7.5-89.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2019-16935
https://bugs.python.org/issue38243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
https://github.com/python/cpython/pull/16373
https://linux.oracle.com/cve/CVE-2019-16935.html
https://linux.oracle.com/errata/ELSA-2020-4433.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://security.netapp.com/advisory/ntap-20191017-0004/
https://ubuntu.com/security/notices/USN-4151-1
https://ubuntu.com/security/notices/USN-4151-2
https://usn.ubuntu.com/4151-1/
https://usn.ubuntu.com/4151-2/
https://www.oracle.com/security-alerts/cpujul2020.html
| +| python | CVE-2019-18348 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-18348
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://nvd.nist.gov/vuln/detail/CVE-2019-18348
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| python | CVE-2019-20907 | MEDIUM | 2.7.5-86.el7 | 2.7.5-90.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html
https://access.redhat.com/security/cve/CVE-2019-20907
https://bugs.python.org/issue39017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
https://errata.almalinux.org/8/ALSA-2020-4654.html
https://github.com/python/cpython/pull/21454
https://linux.oracle.com/cve/CVE-2019-20907.html
https://linux.oracle.com/errata/ELSA-2020-5010.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
https://nvd.nist.gov/vuln/detail/CVE-2019-20907
https://security.gentoo.org/glsa/202008-01
https://security.netapp.com/advisory/ntap-20200731-0002/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.oracle.com/security-alerts/cpujan2021.html
| +| python | CVE-2020-26116 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html
https://access.redhat.com/security/cve/CVE-2020-26116
https://bugs.python.org/issue39603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://linux.oracle.com/cve/CVE-2020-26116.html
https://linux.oracle.com/errata/ELSA-2021-1879.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/
https://nvd.nist.gov/vuln/detail/CVE-2020-26116
https://python-security.readthedocs.io/vuln/http-header-injection-method.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20201023-0001/
https://ubuntu.com/security/notices/USN-4581-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4581-1/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python | CVE-2020-27619 | MEDIUM | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27619
https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://nvd.nist.gov/vuln/detail/CVE-2020-27619
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| +| python | CVE-2020-8492 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://access.redhat.com/security/cve/CVE-2020-8492
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://errata.almalinux.org/8/ALSA-2020-4641.html
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
| +| python | CVE-2021-23336 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python | CVE-2021-3177 | MEDIUM | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3177
https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://nvd.nist.gov/vuln/detail/CVE-2021-3177
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python | CVE-2021-3733 | MEDIUM | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| +| python | CVE-2021-4189 | MEDIUM | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
| +| python | CVE-2022-0391 | MEDIUM | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| python | CVE-2018-1000030 | LOW | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
| +| python | CVE-2019-9674 | LOW | 2.7.5-86.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
| +| python | CVE-2021-3737 | LOW | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| python-libs | CVE-2013-1664 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
http://bugs.python.org/issue17239
http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
http://rhn.redhat.com/errata/RHSA-2013-0657.html
http://rhn.redhat.com/errata/RHSA-2013-0658.html
http://rhn.redhat.com/errata/RHSA-2013-0670.html
http://ubuntu.com/usn/usn-1757-1
http://www.openwall.com/lists/oss-security/2013/02/19/2
http://www.openwall.com/lists/oss-security/2013/02/19/4
https://access.redhat.com/security/cve/CVE-2013-1664
https://bugs.launchpad.net/nova/+bug/1100282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1664
https://ubuntu.com/security/notices/USN-1730-1
https://ubuntu.com/security/notices/USN-1731-1
https://ubuntu.com/security/notices/USN-1734-1
https://ubuntu.com/security/notices/USN-1757-1
https://www.djangoproject.com/weblog/2013/feb/19/security/
| +| python-libs | CVE-2013-1665 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
http://bugs.python.org/issue17239
http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
http://rhn.redhat.com/errata/RHSA-2013-0657.html
http://rhn.redhat.com/errata/RHSA-2013-0658.html
http://rhn.redhat.com/errata/RHSA-2013-0670.html
http://ubuntu.com/usn/usn-1757-1
http://www.debian.org/security/2013/dsa-2634
http://www.openwall.com/lists/oss-security/2013/02/19/2
http://www.openwall.com/lists/oss-security/2013/02/19/4
https://access.redhat.com/security/cve/CVE-2013-1665
https://bugs.launchpad.net/keystone/+bug/1100279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1665
https://ubuntu.com/security/notices/USN-1730-1
https://ubuntu.com/security/notices/USN-1757-1
https://www.djangoproject.com/weblog/2013/feb/19/security/
| +| python-libs | CVE-2013-7040 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://access.redhat.com/security/cve/CVE-2013-7040
https://support.apple.com/kb/HT205031
| +| python-libs | CVE-2017-1000158 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.debian.org/security/2018/dsa-4307
| +| python-libs | CVE-2018-20852 | MEDIUM | 2.7.5-86.el7 | 2.7.5-88.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/errata/RHSA-2019:3948
https://access.redhat.com/security/cve/CVE-2018-20852
https://bugs.python.org/issue35121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://linux.oracle.com/cve/CVE-2018-20852.html
https://linux.oracle.com/errata/ELSA-2020-1764.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00040.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://python-security.readthedocs.io/vuln/cookie-domain-check.html
https://security.gentoo.org/glsa/202003-26
https://ubuntu.com/security/notices/USN-4127-1
https://ubuntu.com/security/notices/USN-4127-2
https://usn.ubuntu.com/4127-1/
https://usn.ubuntu.com/4127-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| python-libs | CVE-2019-16056 | MEDIUM | 2.7.5-86.el7 | 2.7.5-88.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/errata/RHSA-2019:3948
https://access.redhat.com/security/cve/CVE-2019-16056
https://bugs.python.org/issue34155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16056
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9
https://linux.oracle.com/cve/CVE-2019-16056.html
https://linux.oracle.com/errata/ELSA-2020-1764.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/09/msg00018.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00019.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4KZEFP6E4YPYB52AF4WXCUDSGQOTF37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QASRD4E2G65GGEHYKVHYCXB2XWAGTNL4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QP46PQSUKYPGWTADQ67NOV3BUN6JM34Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDQQ56P7ZZR64XV5DUVWNSNXKKEXUG2J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://security.netapp.com/advisory/ntap-20190926-0005/
https://ubuntu.com/security/notices/USN-4151-1
https://ubuntu.com/security/notices/USN-4151-2
https://usn.ubuntu.com/4151-1/
https://usn.ubuntu.com/4151-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
| +| python-libs | CVE-2019-16935 | MEDIUM | 2.7.5-86.el7 | 2.7.5-89.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2019-16935
https://bugs.python.org/issue38243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
https://github.com/python/cpython/pull/16373
https://linux.oracle.com/cve/CVE-2019-16935.html
https://linux.oracle.com/errata/ELSA-2020-4433.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://security.netapp.com/advisory/ntap-20191017-0004/
https://ubuntu.com/security/notices/USN-4151-1
https://ubuntu.com/security/notices/USN-4151-2
https://usn.ubuntu.com/4151-1/
https://usn.ubuntu.com/4151-2/
https://www.oracle.com/security-alerts/cpujul2020.html
| +| python-libs | CVE-2019-18348 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-18348
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://nvd.nist.gov/vuln/detail/CVE-2019-18348
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| python-libs | CVE-2019-20907 | MEDIUM | 2.7.5-86.el7 | 2.7.5-90.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html
https://access.redhat.com/security/cve/CVE-2019-20907
https://bugs.python.org/issue39017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
https://errata.almalinux.org/8/ALSA-2020-4654.html
https://github.com/python/cpython/pull/21454
https://linux.oracle.com/cve/CVE-2019-20907.html
https://linux.oracle.com/errata/ELSA-2020-5010.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
https://nvd.nist.gov/vuln/detail/CVE-2019-20907
https://security.gentoo.org/glsa/202008-01
https://security.netapp.com/advisory/ntap-20200731-0002/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.oracle.com/security-alerts/cpujan2021.html
| +| python-libs | CVE-2020-26116 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html
https://access.redhat.com/security/cve/CVE-2020-26116
https://bugs.python.org/issue39603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://linux.oracle.com/cve/CVE-2020-26116.html
https://linux.oracle.com/errata/ELSA-2021-1879.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/
https://nvd.nist.gov/vuln/detail/CVE-2020-26116
https://python-security.readthedocs.io/vuln/http-header-injection-method.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20201023-0001/
https://ubuntu.com/security/notices/USN-4581-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4581-1/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python-libs | CVE-2020-27619 | MEDIUM | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27619
https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://nvd.nist.gov/vuln/detail/CVE-2020-27619
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| +| python-libs | CVE-2020-8492 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://access.redhat.com/security/cve/CVE-2020-8492
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://errata.almalinux.org/8/ALSA-2020-4641.html
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
| +| python-libs | CVE-2021-23336 | MEDIUM | 2.7.5-86.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python-libs | CVE-2021-3177 | MEDIUM | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3177
https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://nvd.nist.gov/vuln/detail/CVE-2021-3177
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python-libs | CVE-2021-3733 | MEDIUM | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| +| python-libs | CVE-2021-4189 | MEDIUM | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
| +| python-libs | CVE-2022-0391 | MEDIUM | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| python-libs | CVE-2018-1000030 | LOW | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
| +| python-libs | CVE-2019-9674 | LOW | 2.7.5-86.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
| +| python-libs | CVE-2021-3737 | LOW | 2.7.5-86.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| readline | CVE-2016-7091 | LOW | 6.2-11.el7 | |
Expand...http://www.securityfocus.com/bid/92615
https://access.redhat.com/security/cve/CVE-2016-7091
https://linux.oracle.com/cve/CVE-2016-7091.html
https://linux.oracle.com/errata/ELSA-2016-2593.html
https://lists.gnu.org/archive/html/bug-readline/2016-05/msg00009.html
https://rhn.redhat.com/errata/RHSA-2016-2593.html
| +| rpm | CVE-2017-7500 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-7500
https://bugzilla.redhat.com/show_bug.cgi?id=1450369
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
| +| rpm | CVE-2017-7501 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-7501
https://bugzilla.redhat.com/show_bug.cgi?id=1452133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201811-22
| +| rpm | CVE-2021-20271 | MEDIUM | 4.11.3-40.el7 | 4.11.3-48.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2021-20271
https://bugzilla.redhat.com/show_bug.cgi?id=1934125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://linux.oracle.com/cve/CVE-2021-20271.html
https://linux.oracle.com/errata/ELSA-2021-4785.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-20271
https://security.gentoo.org/glsa/202107-43
| +| rpm | CVE-2021-3421 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3421
https://bugzilla.redhat.com/show_bug.cgi?id=1927747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-3421
| +| rpm | CVE-2021-3521 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
https://access.redhat.com/security/cve/CVE-2021-3521
https://linux.oracle.com/cve/CVE-2021-3521.html
https://linux.oracle.com/errata/ELSA-2022-0368.html
| +| rpm | CVE-2021-35937 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35937
| +| rpm | CVE-2021-35938 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35938
| +| rpm | CVE-2021-35939 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35939
| +| rpm | CVE-2021-20266 | LOW | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20266
https://bugzilla.redhat.com/show_bug.cgi?id=1927741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266
https://github.com/rpm-software-management/rpm/pull/1500
https://linux.oracle.com/cve/CVE-2021-20266.html
https://linux.oracle.com/errata/ELSA-2021-4489.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://nvd.nist.gov/vuln/detail/CVE-2021-20266
https://security.gentoo.org/glsa/202107-43
| +| rpm-build-libs | CVE-2017-7500 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-7500
https://bugzilla.redhat.com/show_bug.cgi?id=1450369
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
| +| rpm-build-libs | CVE-2017-7501 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-7501
https://bugzilla.redhat.com/show_bug.cgi?id=1452133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201811-22
| +| rpm-build-libs | CVE-2021-20271 | MEDIUM | 4.11.3-40.el7 | 4.11.3-48.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2021-20271
https://bugzilla.redhat.com/show_bug.cgi?id=1934125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://linux.oracle.com/cve/CVE-2021-20271.html
https://linux.oracle.com/errata/ELSA-2021-4785.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-20271
https://security.gentoo.org/glsa/202107-43
| +| rpm-build-libs | CVE-2021-3421 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3421
https://bugzilla.redhat.com/show_bug.cgi?id=1927747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-3421
| +| rpm-build-libs | CVE-2021-3521 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
https://access.redhat.com/security/cve/CVE-2021-3521
https://linux.oracle.com/cve/CVE-2021-3521.html
https://linux.oracle.com/errata/ELSA-2022-0368.html
| +| rpm-build-libs | CVE-2021-35937 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35937
| +| rpm-build-libs | CVE-2021-35938 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35938
| +| rpm-build-libs | CVE-2021-35939 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35939
| +| rpm-build-libs | CVE-2021-20266 | LOW | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20266
https://bugzilla.redhat.com/show_bug.cgi?id=1927741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266
https://github.com/rpm-software-management/rpm/pull/1500
https://linux.oracle.com/cve/CVE-2021-20266.html
https://linux.oracle.com/errata/ELSA-2021-4489.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://nvd.nist.gov/vuln/detail/CVE-2021-20266
https://security.gentoo.org/glsa/202107-43
| +| rpm-libs | CVE-2017-7500 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-7500
https://bugzilla.redhat.com/show_bug.cgi?id=1450369
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
| +| rpm-libs | CVE-2017-7501 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-7501
https://bugzilla.redhat.com/show_bug.cgi?id=1452133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201811-22
| +| rpm-libs | CVE-2021-20271 | MEDIUM | 4.11.3-40.el7 | 4.11.3-48.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2021-20271
https://bugzilla.redhat.com/show_bug.cgi?id=1934125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://linux.oracle.com/cve/CVE-2021-20271.html
https://linux.oracle.com/errata/ELSA-2021-4785.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-20271
https://security.gentoo.org/glsa/202107-43
| +| rpm-libs | CVE-2021-3421 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3421
https://bugzilla.redhat.com/show_bug.cgi?id=1927747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-3421
| +| rpm-libs | CVE-2021-3521 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
https://access.redhat.com/security/cve/CVE-2021-3521
https://linux.oracle.com/cve/CVE-2021-3521.html
https://linux.oracle.com/errata/ELSA-2022-0368.html
| +| rpm-libs | CVE-2021-35937 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35937
| +| rpm-libs | CVE-2021-35938 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35938
| +| rpm-libs | CVE-2021-35939 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35939
| +| rpm-libs | CVE-2021-20266 | LOW | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20266
https://bugzilla.redhat.com/show_bug.cgi?id=1927741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266
https://github.com/rpm-software-management/rpm/pull/1500
https://linux.oracle.com/cve/CVE-2021-20266.html
https://linux.oracle.com/errata/ELSA-2021-4489.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://nvd.nist.gov/vuln/detail/CVE-2021-20266
https://security.gentoo.org/glsa/202107-43
| +| rpm-python | CVE-2017-7500 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-7500
https://bugzilla.redhat.com/show_bug.cgi?id=1450369
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
| +| rpm-python | CVE-2017-7501 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-7501
https://bugzilla.redhat.com/show_bug.cgi?id=1452133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201811-22
| +| rpm-python | CVE-2021-20271 | MEDIUM | 4.11.3-40.el7 | 4.11.3-48.el7_9 |
Expand...https://access.redhat.com/security/cve/CVE-2021-20271
https://bugzilla.redhat.com/show_bug.cgi?id=1934125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://linux.oracle.com/cve/CVE-2021-20271.html
https://linux.oracle.com/errata/ELSA-2021-4785.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-20271
https://security.gentoo.org/glsa/202107-43
| +| rpm-python | CVE-2021-3421 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3421
https://bugzilla.redhat.com/show_bug.cgi?id=1927747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-3421
| +| rpm-python | CVE-2021-3521 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
https://access.redhat.com/security/cve/CVE-2021-3521
https://linux.oracle.com/cve/CVE-2021-3521.html
https://linux.oracle.com/errata/ELSA-2022-0368.html
| +| rpm-python | CVE-2021-35937 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35937
| +| rpm-python | CVE-2021-35938 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35938
| +| rpm-python | CVE-2021-35939 | MEDIUM | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35939
| +| rpm-python | CVE-2021-20266 | LOW | 4.11.3-40.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20266
https://bugzilla.redhat.com/show_bug.cgi?id=1927741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266
https://github.com/rpm-software-management/rpm/pull/1500
https://linux.oracle.com/cve/CVE-2021-20266.html
https://linux.oracle.com/errata/ELSA-2021-4489.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://nvd.nist.gov/vuln/detail/CVE-2021-20266
https://security.gentoo.org/glsa/202107-43
| +| rsync | CVE-2014-9512 | MEDIUM | 3.1.2-10.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-02/msg00041.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00095.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00112.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.securityfocus.com/bid/76093
http://www.securitytracker.com/id/1034786
http://www.ubuntu.com/usn/USN-2879-1
http://xteam.baidu.com/?p=169
https://access.redhat.com/security/cve/CVE-2014-9512
https://bugzilla.samba.org/show_bug.cgi?id=10977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9512
https://security.gentoo.org/glsa/201605-04
https://support.apple.com/kb/HT211168
https://support.apple.com/kb/HT211170
https://support.apple.com/kb/HT211171
https://support.apple.com/kb/HT211175
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-2879-1
| +| rsync | CVE-2017-15994 | MEDIUM | 3.1.2-10.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-15994
https://git.samba.org/?p=rsync.git;a=commit;h=7b8a4ecd6ff9cdf4e5d3850ebf822f1e989255b3
https://git.samba.org/?p=rsync.git;a=commit;h=9a480deec4d20277d8e20bc55515ef0640ca1e55
https://git.samba.org/?p=rsync.git;a=commit;h=c252546ceeb0925eb8a4061315e3ff0a8c55b48b
| +| rsync | CVE-2017-16548 | MEDIUM | 3.1.2-10.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-16548
https://bugzilla.samba.org/show_bug.cgi?id=13112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548
https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1
https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html
https://ubuntu.com/security/notices/USN-3543-1
https://ubuntu.com/security/notices/USN-3543-2
https://usn.ubuntu.com/3543-1/
https://usn.ubuntu.com/3543-2/
https://www.debian.org/security/2017/dsa-4068
| +| rsync | CVE-2017-17433 | MEDIUM | 3.1.2-10.el7 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=169
https://access.redhat.com/security/cve/CVE-2017-17433
https://bugzilla.redhat.com/show_bug.cgi?id=1522874#c4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17433
https://git.samba.org/?p=rsync.git;a=commit;h=3e06d40029cfdce9d0f73d87cfd4edaf54be9c51
https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html
https://ubuntu.com/security/notices/USN-3506-1
https://ubuntu.com/security/notices/USN-3506-2
https://www.debian.org/security/2017/dsa-4068
| +| rsync | CVE-2017-17434 | MEDIUM | 3.1.2-10.el7 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=170
https://access.redhat.com/security/cve/CVE-2017-17434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17434
https://git.samba.org/?p=rsync.git;a=commit;h=5509597decdbd7b91994210f700329d8a35e70a1
https://git.samba.org/?p=rsync.git;a=commit;h=70aeb5fddd1b2f8e143276f8d5a085db16c593b9
https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html
https://ubuntu.com/security/notices/USN-3506-1
https://ubuntu.com/security/notices/USN-3506-2
https://www.debian.org/security/2017/dsa-4068
| +| rsync | CVE-2018-5764 | MEDIUM | 3.1.2-10.el7 | |
Expand...http://www.securityfocus.com/bid/102803
http://www.securitytracker.com/id/1040276
https://access.redhat.com/security/cve/CVE-2018-5764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5764
https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS
https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=7706303828fcde524222babb2833864a4bd09e07
https://lists.debian.org/debian-lts-announce/2018/01/msg00021.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00028.html
https://security.gentoo.org/glsa/201805-04
https://ubuntu.com/security/notices/USN-3543-1
https://ubuntu.com/security/notices/USN-3543-2
https://usn.ubuntu.com/3543-1/
| +| shared-mime-info | CVE-2019-3820 | MEDIUM | 1.8-4.el7 | 1.8-5.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00049.html
https://access.redhat.com/security/cve/CVE-2019-3820
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3820
https://gitlab.gnome.org/GNOME/gnome-shell/issues/851
https://linux.oracle.com/cve/CVE-2019-3820.html
https://linux.oracle.com/errata/ELSA-2020-1021.html
https://ubuntu.com/security/notices/USN-3966-1
https://usn.ubuntu.com/3966-1/
| +| sqlite | CVE-2019-13734 | HIGH | 3.7.17-8.el7 | 3.7.17-8.el7_7.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
https://access.redhat.com/errata/RHSA-2019:4238
https://access.redhat.com/errata/RHSA-2020:0227
https://access.redhat.com/errata/RHSA-2020:0229
https://access.redhat.com/errata/RHSA-2020:0273
https://access.redhat.com/errata/RHSA-2020:0451
https://access.redhat.com/errata/RHSA-2020:0463
https://access.redhat.com/errata/RHSA-2020:0476
https://access.redhat.com/security/cve/CVE-2019-13734
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
https://crbug.com/1025466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13734
https://linux.oracle.com/cve/CVE-2019-13734.html
https://linux.oracle.com/errata/ELSA-2020-0273.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
https://seclists.org/bugtraq/2020/Jan/27
https://security.gentoo.org/glsa/202003-08
https://ubuntu.com/security/notices/USN-4298-1
https://ubuntu.com/security/notices/USN-4298-2
https://usn.ubuntu.com/4298-1/
https://usn.ubuntu.com/4298-2/
https://www.debian.org/security/2020/dsa-4606
https://www.oracle.com/security-alerts/cpujan2022.html
| +| sqlite | CVE-2015-7036 | MEDIUM | 3.7.17-8.el7 | |
Expand...http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://zerodayinitiative.com/advisories/ZDI-15-570/
https://access.redhat.com/security/cve/CVE-2015-7036
https://security.gentoo.org/glsa/201612-21
| +| sqlite | CVE-2017-7000 | MEDIUM | 3.7.17-8.el7 | |
Expand...http://www.securityfocus.com/bid/98767
http://www.securityfocus.com/bid/99950
https://access.redhat.com/errata/RHSA-2017:1833
https://access.redhat.com/security/cve/CVE-2017-7000
https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7000
https://security.gentoo.org/glsa/201709-15
https://support.apple.com/HT207797
https://support.apple.com/HT207798
https://www.debian.org/security/2017/dsa-3926
https://www.sqlite.org/bindptr.html
| +| sqlite | CVE-2019-13751 | MEDIUM | 3.7.17-8.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
https://access.redhat.com/errata/RHSA-2019:4238
https://access.redhat.com/security/cve/CVE-2019-13751
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
https://crbug.com/1025465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13751
https://linux.oracle.com/cve/CVE-2019-13751.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
https://seclists.org/bugtraq/2020/Jan/27
https://security.gentoo.org/glsa/202003-08
https://ubuntu.com/security/notices/USN-4298-1
https://ubuntu.com/security/notices/USN-4298-2
https://usn.ubuntu.com/4298-1/
https://usn.ubuntu.com/4298-2/
https://www.debian.org/security/2020/dsa-4606
| +| sqlite | CVE-2019-13752 | MEDIUM | 3.7.17-8.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
https://access.redhat.com/errata/RHSA-2019:4238
https://access.redhat.com/security/cve/CVE-2019-13752
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
https://crbug.com/1025470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13752
https://linux.oracle.com/cve/CVE-2019-13752.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
https://seclists.org/bugtraq/2020/Jan/27
https://security.gentoo.org/glsa/202003-08
https://ubuntu.com/security/notices/USN-4298-1
https://ubuntu.com/security/notices/USN-4298-2
https://usn.ubuntu.com/4298-1/
https://usn.ubuntu.com/4298-2/
https://www.debian.org/security/2020/dsa-4606
| +| sqlite | CVE-2019-13753 | MEDIUM | 3.7.17-8.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
https://access.redhat.com/errata/RHSA-2019:4238
https://access.redhat.com/security/cve/CVE-2019-13753
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
https://crbug.com/1025471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13753
https://linux.oracle.com/cve/CVE-2019-13753.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
https://seclists.org/bugtraq/2020/Jan/27
https://security.gentoo.org/glsa/202003-08
https://ubuntu.com/security/notices/USN-4298-1
https://ubuntu.com/security/notices/USN-4298-2
https://usn.ubuntu.com/4298-1/
https://usn.ubuntu.com/4298-2/
https://www.debian.org/security/2020/dsa-4606
| +| sqlite | CVE-2019-19603 | MEDIUM | 3.7.17-8.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19603
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| sqlite | CVE-2019-19645 | MEDIUM | 3.7.17-8.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19645
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
| +| sqlite | CVE-2019-19880 | MEDIUM | 3.7.17-8.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html
https://access.redhat.com/errata/RHSA-2020:0514
https://access.redhat.com/security/cve/CVE-2019-19880
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880
https://github.com/sqlite/sqlite/commit/75e95e1fcd52d3ec8282edb75ac8cd0814095d54
https://security.netapp.com/advisory/ntap-20200114-0001/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.debian.org/security/2020/dsa-4638
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| sqlite | CVE-2019-19924 | MEDIUM | 3.7.17-8.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| sqlite | CVE-2019-20218 | MEDIUM | 3.7.17-8.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-20218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218
https://github.com/sqlite/sqlite/commit/a6c1a71cde082e09750465d5675699062922e387
https://linux.oracle.com/cve/CVE-2019-20218.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00016.html
https://security.gentoo.org/glsa/202007-26
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| sqlite | CVE-2019-5827 | MEDIUM | 3.7.17-8.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html
https://access.redhat.com/security/cve/CVE-2019-5827
https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html
https://crbug.com/952406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827
https://linux.oracle.com/cve/CVE-2019-5827.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/
https://seclists.org/bugtraq/2019/Aug/19
https://security.gentoo.org/glsa/202003-16
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.debian.org/security/2019/dsa-4500
| +| sqlite | CVE-2019-8457 | MEDIUM | 3.7.17-8.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| +| sqlite | CVE-2020-13435 | MEDIUM | 3.7.17-8.el7 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435
https://linux.oracle.com/cve/CVE-2020-13435.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200528-0004/
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.sqlite.org/src/info/7a5279a25c57adf1
| +| sqlite | CVE-2020-13631 | MEDIUM | 3.7.17-8.el7 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13631
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| sqlite | CVE-2016-6153 | LOW | 3.7.17-8.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00053.html
http://www.openwall.com/lists/oss-security/2016/07/01/1
http://www.openwall.com/lists/oss-security/2016/07/01/2
http://www.securityfocus.com/bid/91546
http://www.sqlite.org/cgi/src/info/67985761aa93fb61
https://access.redhat.com/security/cve/CVE-2016-6153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGQTH7V45QVHFDXJAEECHEO3HHD644WZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt
https://www.sqlite.org/releaselog/3_13_0.html
https://www.tenable.com/security/tns-2016-20
| +| sqlite | CVE-2017-10989 | LOW | 3.7.17-8.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html
http://marc.info/?l=sqlite-users&m=149933696214713&w=2
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/99502
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-10989
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405
https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989
https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html
https://sqlite.org/src/info/66de6f4a
https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26
https://support.apple.com/HT208112
https://support.apple.com/HT208113
https://support.apple.com/HT208115
https://support.apple.com/HT208144
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
| +| sqlite | CVE-2017-13685 | LOW | 3.7.17-8.el7 | |
Expand...http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html
http://www.securityfocus.com/bid/100521
https://access.redhat.com/security/cve/CVE-2017-13685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
| +| sqlite | CVE-2017-15286 | LOW | 3.7.17-8.el7 | |
Expand...http://www.securityfocus.com/bid/101285
https://access.redhat.com/security/cve/CVE-2017-15286
https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md
| +| sqlite | CVE-2018-8740 | LOW | 3.7.17-8.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html
http://www.securityfocus.com/bid/103466
https://access.redhat.com/security/cve/CVE-2018-8740
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964
https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
https://ubuntu.com/security/notices/USN-4205-1
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4205-1/
https://usn.ubuntu.com/4394-1/
https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema
https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b
| +| sqlite | CVE-2019-19244 | LOW | 3.7.17-8.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19244
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| sqlite | CVE-2021-45346 | LOW | 3.7.17-8.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| +| systemd | CVE-2013-4392 | MEDIUM | 219-67.el7_7.1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| systemd | CVE-2017-18078 | MEDIUM | 219-67.el7_7.1 | |
Expand...http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
http://www.openwall.com/lists/oss-security/2018/01/29/3
https://access.redhat.com/security/cve/CVE-2017-18078
https://github.com/systemd/systemd/issues/7736
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://www.exploit-db.com/exploits/43935/
https://www.openwall.com/lists/oss-security/2018/01/29/4
| +| systemd | CVE-2018-6954 | MEDIUM | 219-67.el7_7.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
https://access.redhat.com/security/cve/CVE-2018-6954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954
https://github.com/systemd/systemd/issues/7986
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3816-1
https://ubuntu.com/security/notices/USN-3816-2
https://usn.ubuntu.com/3816-1/
https://usn.ubuntu.com/3816-2/
| +| systemd | CVE-2019-3842 | MEDIUM | 219-67.el7_7.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html
https://access.redhat.com/security/cve/CVE-2019-3842
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842
https://linux.oracle.com/cve/CVE-2019-3842.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
https://nvd.nist.gov/vuln/detail/CVE-2019-3842
https://ubuntu.com/security/notices/USN-3938-1
https://www.exploit-db.com/exploits/46743/
| +| systemd | CVE-2020-13529 | MEDIUM | 219-67.el7_7.1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| systemd | CVE-2020-13776 | MEDIUM | 219-67.el7_7.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| systemd | CVE-2021-3997 | MEDIUM | 219-67.el7_7.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| systemd | CVE-2016-6349 | LOW | 219-67.el7_7.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/07/26/9
http://www.openwall.com/lists/oss-security/2016/10/13/7
http://www.securityfocus.com/bid/92143
https://access.redhat.com/security/cve/CVE-2016-6349
https://bugzilla.redhat.com/show_bug.cgi?id=1360634
https://github.com/projectatomic/oci-register-machine/pull/22
| +| systemd | CVE-2019-20386 | LOW | 219-67.el7_7.1 | 219-78.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| systemd-libs | CVE-2013-4392 | MEDIUM | 219-67.el7_7.1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| systemd-libs | CVE-2017-18078 | MEDIUM | 219-67.el7_7.1 | |
Expand...http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
http://www.openwall.com/lists/oss-security/2018/01/29/3
https://access.redhat.com/security/cve/CVE-2017-18078
https://github.com/systemd/systemd/issues/7736
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://www.exploit-db.com/exploits/43935/
https://www.openwall.com/lists/oss-security/2018/01/29/4
| +| systemd-libs | CVE-2018-6954 | MEDIUM | 219-67.el7_7.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
https://access.redhat.com/security/cve/CVE-2018-6954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954
https://github.com/systemd/systemd/issues/7986
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3816-1
https://ubuntu.com/security/notices/USN-3816-2
https://usn.ubuntu.com/3816-1/
https://usn.ubuntu.com/3816-2/
| +| systemd-libs | CVE-2019-3842 | MEDIUM | 219-67.el7_7.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html
https://access.redhat.com/security/cve/CVE-2019-3842
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842
https://linux.oracle.com/cve/CVE-2019-3842.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
https://nvd.nist.gov/vuln/detail/CVE-2019-3842
https://ubuntu.com/security/notices/USN-3938-1
https://www.exploit-db.com/exploits/46743/
| +| systemd-libs | CVE-2020-13529 | MEDIUM | 219-67.el7_7.1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| systemd-libs | CVE-2020-13776 | MEDIUM | 219-67.el7_7.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| systemd-libs | CVE-2021-3997 | MEDIUM | 219-67.el7_7.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| systemd-libs | CVE-2016-6349 | LOW | 219-67.el7_7.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/07/26/9
http://www.openwall.com/lists/oss-security/2016/10/13/7
http://www.securityfocus.com/bid/92143
https://access.redhat.com/security/cve/CVE-2016-6349
https://bugzilla.redhat.com/show_bug.cgi?id=1360634
https://github.com/projectatomic/oci-register-machine/pull/22
| +| systemd-libs | CVE-2019-20386 | LOW | 219-67.el7_7.1 | 219-78.el7 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| tar | CVE-2005-2541 | MEDIUM | 2:1.26-35.el7 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2016-6321 | MEDIUM | 2:1.26-35.el7 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=7340f67b9860ea0531c1450e5aa261c50f67165d
http://lists.gnu.org/archive/html/bug-tar/2016-10/msg00016.html
http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html
http://seclists.org/fulldisclosure/2016/Oct/102
http://seclists.org/fulldisclosure/2016/Oct/96
http://www.debian.org/security/2016/dsa-3702
http://www.securityfocus.com/bid/93937
http://www.ubuntu.com/usn/USN-3132-1
https://access.redhat.com/security/cve/CVE-2016-6321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201611-19
https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt
https://sintonen.fi/advisories/tar-extract-pathname-bypass.txt
https://ubuntu.com/security/notices/USN-3132-1
| +| tar | CVE-2018-20482 | LOW | 2:1.26-35.el7 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454
http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://www.securityfocus.com/bid/106354
https://access.redhat.com/security/cve/CVE-2018-20482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20482
https://lists.debian.org/debian-lts-announce/2018/12/msg00023.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00025.html
https://news.ycombinator.com/item?id=18745431
https://security.gentoo.org/glsa/201903-05
https://twitter.com/thatcks/status/1076166645708668928
https://ubuntu.com/security/notices/USN-4692-1
https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug
| +| tar | CVE-2019-9923 | LOW | 2:1.26-35.el7 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 2:1.26-35.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| unzip | CVE-2015-7696 | MEDIUM | 6.0-21.el7 | |
Expand...http://www.debian.org/security/2015/dsa-3386
http://www.openwall.com/lists/oss-security/2015/09/07/4
http://www.openwall.com/lists/oss-security/2015/09/15/6
http://www.openwall.com/lists/oss-security/2015/09/21/6
http://www.openwall.com/lists/oss-security/2015/10/11/5
http://www.securityfocus.com/bid/76863
http://www.securitytracker.com/id/1034027
http://www.ubuntu.com/usn/USN-2788-1
http://www.ubuntu.com/usn/USN-2788-2
https://access.redhat.com/security/cve/CVE-2015-7696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7696
https://nvd.nist.gov/vuln/detail/CVE-2015-7696
https://ubuntu.com/security/notices/USN-2788-1
| +| unzip | CVE-2015-7697 | MEDIUM | 6.0-21.el7 | |
Expand...http://sourceforge.net/p/infozip/patches/23/
http://www.debian.org/security/2015/dsa-3386
http://www.openwall.com/lists/oss-security/2015/09/07/4
http://www.openwall.com/lists/oss-security/2015/09/15/6
http://www.openwall.com/lists/oss-security/2015/10/11/5
http://www.securityfocus.com/bid/76863
http://www.securitytracker.com/id/1034027
http://www.ubuntu.com/usn/USN-2788-1
http://www.ubuntu.com/usn/USN-2788-2
https://access.redhat.com/security/cve/CVE-2015-7697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7697
https://nvd.nist.gov/vuln/detail/CVE-2015-7697
https://ubuntu.com/security/notices/USN-2788-1
| +| unzip | CVE-2014-9913 | LOW | 6.0-21.el7 | |
Expand...http://openwall.com/lists/oss-security/2016/12/05/20
http://www.openwall.com/lists/oss-security/2014/11/03/5
http://www.openwall.com/lists/oss-security/2016/12/05/13
http://www.openwall.com/lists/oss-security/2016/12/05/19
http://www.openwall.com/lists/oss-security/2016/12/05/20
http://www.securityfocus.com/bid/95081
https://access.redhat.com/security/cve/CVE-2014-9913
https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9913
https://nvd.nist.gov/vuln/detail/CVE-2014-9913
https://ubuntu.com/security/notices/USN-4672-1
| +| unzip | CVE-2016-9844 | LOW | 6.0-21.el7 | |
Expand...http://openwall.com/lists/oss-security/2016/12/05/20
http://openwall.com/lists/oss-security/2016/12/05/25
http://www.openwall.com/lists/oss-security/2016/12/05/13
http://www.openwall.com/lists/oss-security/2016/12/05/19
http://www.openwall.com/lists/oss-security/2016/12/05/20
http://www.securityfocus.com/bid/94728
https://access.redhat.com/security/cve/CVE-2016-9844
https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9844
https://nvd.nist.gov/vuln/detail/CVE-2016-9844
https://ubuntu.com/security/notices/USN-4672-1
| +| unzip | CVE-2018-1000035 | LOW | 6.0-21.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-1000035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000035
https://lists.debian.org/debian-lts-announce/2020/01/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1000035
https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
https://security.gentoo.org/glsa/202003-58
https://ubuntu.com/security/notices/USN-4672-1
https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
| +| unzip | CVE-2021-4217 | LOW | 6.0-21.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217
| +| unzip | CVE-2022-0529 | LOW | 6.0-21.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0529
https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529
https://github.com/ByteHackr/unzip_poc
https://nvd.nist.gov/vuln/detail/CVE-2022-0529
| +| unzip | CVE-2022-0530 | LOW | 6.0-21.el7 | |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/security/cve/CVE-2022-0530
https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530
https://github.com/ByteHackr/unzip_poc
https://nvd.nist.gov/vuln/detail/CVE-2022-0530
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
| +| util-linux | CVE-2014-9114 | MEDIUM | 2.23.2-61.el7 | |
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
http://www.openwall.com/lists/oss-security/2014/11/26/13
http://www.openwall.com/lists/oss-security/2014/11/26/21
http://www.securityfocus.com/bid/71327
https://access.redhat.com/security/cve/CVE-2014-9114
https://bugzilla.redhat.com/show_bug.cgi?id=1168485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114
https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201612-14
| +| util-linux | CVE-2016-2779 | MEDIUM | 2.23.2-61.el7 | |
Expand...http://marc.info/?l=util-linux-ng&m=145694736107128&w=2
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779
| +| util-linux | CVE-2022-0563 | MEDIUM | 2.23.2-61.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| util-linux | CVE-2015-5218 | LOW | 2.23.2-61.el7 | |
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
http://www.spinics.net/lists/util-linux-ng/msg11873.html
https://access.redhat.com/security/cve/CVE-2015-5218
https://bugzilla.redhat.com/show_bug.cgi?id=1259322
https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
| +| util-linux | CVE-2021-37600 | LOW | 2.23.2-61.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| vim-minimal | CVE-2019-20807 | MEDIUM | 2:7.4.629-6.el7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html
http://seclists.org/fulldisclosure/2020/Jul/24
https://access.redhat.com/security/cve/CVE-2019-20807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20807
https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075
https://github.com/vim/vim/releases/tag/v8.1.0881
https://linux.oracle.com/cve/CVE-2019-20807.html
https://linux.oracle.com/errata/ELSA-2020-4453.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-20807
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4582-1
https://ubuntu.com/security/notices/USN-5147-1
https://usn.ubuntu.com/4582-1/
| +| vim-minimal | CVE-2021-3778 | MEDIUM | 2:7.4.629-6.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json
https://access.redhat.com/security/cve/CVE-2021-3778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778
https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
https://linux.oracle.com/cve/CVE-2021-3778.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://nvd.nist.gov/vuln/detail/CVE-2021-3778
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-minimal | CVE-2021-3796 | MEDIUM | 2:7.4.629-6.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json
https://access.redhat.com/security/cve/CVE-2021-3796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796
https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
https://linux.oracle.com/cve/CVE-2021-3796.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://nvd.nist.gov/vuln/detail/CVE-2021-3796
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-minimal | CVE-2021-3872 | MEDIUM | 2:7.4.629-6.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
https://linux.oracle.com/cve/CVE-2021-3872.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://nvd.nist.gov/vuln/detail/CVE-2021-3872
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-minimal | CVE-2021-3984 | MEDIUM | 2:7.4.629-6.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json
https://access.redhat.com/security/cve/CVE-2021-3984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
https://linux.oracle.com/cve/CVE-2021-3984.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://nvd.nist.gov/vuln/detail/CVE-2021-3984
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-minimal | CVE-2021-4019 | MEDIUM | 2:7.4.629-6.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json
https://access.redhat.com/security/cve/CVE-2021-4019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://linux.oracle.com/cve/CVE-2021-4019.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://nvd.nist.gov/vuln/detail/CVE-2021-4019
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-minimal | CVE-2021-4192 | MEDIUM | 2:7.4.629-6.el7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/
https://linux.oracle.com/cve/CVE-2021-4192.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4192
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-minimal | CVE-2021-4193 | MEDIUM | 2:7.4.629-6.el7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4193
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
| +| vim-minimal | CVE-2022-0359 | MEDIUM | 2:7.4.629-6.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0359
| +| vim-minimal | CVE-2022-1619 | MEDIUM | 2:7.4.629-6.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619
https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1619
| +| vim-minimal | CVE-2022-1621 | MEDIUM | 2:7.4.629-6.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)
https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://nvd.nist.gov/vuln/detail/CVE-2022-1621
| +| vim-minimal | CVE-2022-1629 | MEDIUM | 2:7.4.629-6.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1629
https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd
https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://nvd.nist.gov/vuln/detail/CVE-2022-1629
| +| vim-minimal | CVE-2017-1000382 | LOW | 2:7.4.629-6.el7 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
https://access.redhat.com/security/cve/CVE-2017-1000382
| +| vim-minimal | CVE-2017-11109 | LOW | 2:7.4.629-6.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-11109
https://bugzilla.redhat.com/show_bug.cgi?id=1468492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11109
https://lists.debian.org/debian-lts-announce/2019/08/msg00003.html
https://ubuntu.com/security/notices/USN-4309-1
https://usn.ubuntu.com/4309-1/
https://www.mail-archive.com/vim_dev@googlegroups.com/msg45274.html
| +| vim-minimal | CVE-2017-17087 | LOW | 2:7.4.629-6.el7 | |
Expand...http://openwall.com/lists/oss-security/2017/11/27/2
http://security.cucumberlinux.com/security/details.php?id=166
https://access.redhat.com/security/cve/CVE-2017-17087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17087
https://github.com/vim/vim/commit/5a73e0ca54c77e067c3b12ea6f35e3e8681e8cf8
https://groups.google.com/d/msg/vim_dev/sRT9BtjLWMk/BRtSXNU4BwAJ
https://lists.debian.org/debian-lts-announce/2019/08/msg00003.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://ubuntu.com/security/notices/USN-4582-1
https://ubuntu.com/security/notices/USN-5147-1
https://usn.ubuntu.com/4582-1/
| +| vim-minimal | CVE-2017-5953 | LOW | 2:7.4.629-6.el7 | |
Expand...http://www.debian.org/security/2017/dsa-3786
http://www.securityfocus.com/bid/96217
https://access.redhat.com/security/cve/CVE-2017-5953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5953
https://github.com/vim/vim/commit/399c297aa93afe2c0a39e2a1b3f972aebba44c9d
https://groups.google.com/forum/#!topic/vim_dev/t-3RSdEnrHY
https://security.gentoo.org/glsa/201706-26
https://ubuntu.com/security/notices/USN-4016-1
https://ubuntu.com/security/notices/USN-4309-1
https://usn.ubuntu.com/4016-1/
https://usn.ubuntu.com/4309-1/
| +| vim-minimal | CVE-2017-6350 | LOW | 2:7.4.629-6.el7 | |
Expand...http://www.securityfocus.com/bid/96448
http://www.securitytracker.com/id/1037949
https://access.redhat.com/security/cve/CVE-2017-6350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6350
https://github.com/vim/vim/commit/0c8485f0e4931463c0f7986e1ea84a7d79f10c75
https://groups.google.com/forum/#!topic/vim_dev/L_dOHOOiQ5Q
https://groups.google.com/forum/#!topic/vim_dev/QPZc0CY9j3Y
https://security.gentoo.org/glsa/201706-26
https://ubuntu.com/security/notices/USN-4309-1
https://usn.ubuntu.com/4309-1/
| +| vim-minimal | CVE-2021-3903 | LOW | 2:7.4.629-6.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://nvd.nist.gov/vuln/detail/CVE-2021-3903
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-minimal | CVE-2021-3927 | LOW | 2:7.4.629-6.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927
https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://nvd.nist.gov/vuln/detail/CVE-2021-3927
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-minimal | CVE-2021-3974 | LOW | 2:7.4.629-6.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://nvd.nist.gov/vuln/detail/CVE-2021-3974
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-minimal | CVE-2021-4069 | LOW | 2:7.4.629-6.el7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/
https://nvd.nist.gov/vuln/detail/CVE-2021-4069
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-minimal | CVE-2021-4166 | LOW | 2:7.4.629-6.el7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4166
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
| +| vim-minimal | CVE-2022-0351 | LOW | 2:7.4.629-6.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
| +| vim-minimal | CVE-2022-1154 | LOW | 2:7.4.629-6.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
https://linux.oracle.com/cve/CVE-2022-1154.html
https://linux.oracle.com/errata/ELSA-2022-1552.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-1154
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-minimal | CVE-2022-1733 | LOW | 2:7.4.629-6.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1733
https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813
https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/
https://nvd.nist.gov/vuln/detail/CVE-2022-1733
| +| vim-minimal | CVE-2022-1735 | LOW | 2:7.4.629-6.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1735
https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97
https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9
https://nvd.nist.gov/vuln/detail/CVE-2022-1735
| +| vim-minimal | CVE-2022-1769 | LOW | 2:7.4.629-6.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1769
https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4
https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/
https://nvd.nist.gov/vuln/detail/CVE-2022-1769
| +| vim-minimal | CVE-2022-1771 | LOW | 2:7.4.629-6.el7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1771
https://github.com/vim/vim/commit/51f0bfb88a3554ca2dde777d78a59880d1ee37a8
https://huntr.dev/bounties/faa74175-5317-4b71-a363-dfc39094ecbb
https://nvd.nist.gov/vuln/detail/CVE-2022-1771
| +| wget | CVE-2021-31879 | MEDIUM | 1.14-18.el7_6.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-31879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879
https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
https://nvd.nist.gov/vuln/detail/CVE-2021-31879
https://savannah.gnu.org/bugs/?56909
https://security.netapp.com/advisory/ntap-20210618-0002/
| +| wget | CVE-2017-6508 | LOW | 1.14-18.el7_6.1 | |
Expand...http://git.savannah.gnu.org/cgit/wget.git/commit/?id=4d729e322fae359a1aefaafec1144764a54e8ad4
http://lists.gnu.org/archive/html/bug-wget/2017-03/msg00018.html
http://www.securityfocus.com/bid/96877
https://access.redhat.com/security/cve/CVE-2017-6508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6508
https://security.gentoo.org/glsa/201706-16
https://ubuntu.com/security/notices/USN-3464-1
https://ubuntu.com/security/notices/USN-3464-2
| +| zlib | CVE-2018-25032 | HIGH | 1.2.7-18.el7 | 1.2.7-20.el7_9 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| +| zlib-devel | CVE-2018-25032 | HIGH | 1.2.7-18.el7 | 1.2.7-20.el7_9 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + +**node-pkg** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**python-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| pip | CVE-2021-3572 | MEDIUM | 21.0.1 | 21.1 |
Expand...https://access.redhat.com/errata/RHSA-2021:3254
https://access.redhat.com/security/cve/CVE-2021-3572
https://bugzilla.redhat.com/show_bug.cgi?id=1962856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3572
https://github.com/advisories/GHSA-5xp3-jfq3-5q8x
https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b
https://github.com/pypa/pip/issues/10042
https://github.com/pypa/pip/issues/10042#issuecomment-857452480
https://github.com/pypa/pip/pull/9827
https://github.com/skazi0/CVE-2021-3572/blob/master/CVE-2021-3572-v9.0.1.patch
https://linux.oracle.com/cve/CVE-2021-3572.html
https://linux.oracle.com/errata/ELSA-2021-4455.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3572
https://packetstormsecurity.com/files/162712/USN-4961-1.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| urllib3 | CVE-2021-33503 | HIGH | 1.25.11 | 1.26.5 |
Expand...https://access.redhat.com/security/cve/CVE-2021-33503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/advisories/GHSA-q2q7-5pp4-w6pg
https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec
https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg
https://linux.oracle.com/cve/CVE-2021-33503.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/
https://nvd.nist.gov/vuln/detail/CVE-2021-33503
https://security.gentoo.org/glsa/202107-36
https://www.oracle.com/security-alerts/cpuoct2021.html
| diff --git a/stable/meshroom/1.0.0/templates/common.yaml b/stable/meshroom/1.0.0/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/stable/meshroom/1.0.0/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/stable/meshroom/1.0.0/values.yaml b/stable/meshroom/1.0.0/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/meshroom/item.yaml b/stable/meshroom/item.yaml new file mode 100644 index 00000000000..16884c19d5c --- /dev/null +++ b/stable/meshroom/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/meshroom.png +categories: +- media +