From 73e34bb45046922da0449815ebea8d8a3e32ea85 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Sun, 27 Mar 2022 01:49:14 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- incubator/ml-workspace/0.0.1/CHANGELOG.md | 10 + incubator/ml-workspace/0.0.1/CONFIG.md | 7 + incubator/ml-workspace/0.0.1/Chart.lock | 6 + incubator/ml-workspace/0.0.1/Chart.yaml | 29 + incubator/ml-workspace/0.0.1/README.md | 39 + incubator/ml-workspace/0.0.1/app-readme.md | 3 + .../0.0.1/charts/common-9.1.15.tgz | Bin 0 -> 43530 bytes .../ml-workspace/0.0.1/ci/minimal-values.yaml | 1 + incubator/ml-workspace/0.0.1/helm-values.md | 51 + incubator/ml-workspace/0.0.1/ix_values.yaml | 65 + incubator/ml-workspace/0.0.1/questions.yaml | 2489 +++++++++++++++++ incubator/ml-workspace/0.0.1/security.md | 1392 +++++++++ .../ml-workspace/0.0.1/templates/common.yaml | 1 + incubator/ml-workspace/0.0.1/values.yaml | 0 incubator/ml-workspace/item.yaml | 4 + 15 files changed, 4097 insertions(+) create mode 100644 incubator/ml-workspace/0.0.1/CHANGELOG.md create mode 100644 incubator/ml-workspace/0.0.1/CONFIG.md create mode 100644 incubator/ml-workspace/0.0.1/Chart.lock create mode 100644 incubator/ml-workspace/0.0.1/Chart.yaml create mode 100644 incubator/ml-workspace/0.0.1/README.md create mode 100644 incubator/ml-workspace/0.0.1/app-readme.md create mode 100644 incubator/ml-workspace/0.0.1/charts/common-9.1.15.tgz create mode 100644 incubator/ml-workspace/0.0.1/ci/minimal-values.yaml create mode 100644 incubator/ml-workspace/0.0.1/helm-values.md create mode 100644 incubator/ml-workspace/0.0.1/ix_values.yaml create mode 100644 incubator/ml-workspace/0.0.1/questions.yaml create mode 100644 incubator/ml-workspace/0.0.1/security.md create mode 100644 incubator/ml-workspace/0.0.1/templates/common.yaml create mode 100644 incubator/ml-workspace/0.0.1/values.yaml create mode 100644 incubator/ml-workspace/item.yaml diff --git a/incubator/ml-workspace/0.0.1/CHANGELOG.md b/incubator/ml-workspace/0.0.1/CHANGELOG.md new file mode 100644 index 00000000000..9d8ee151343 --- /dev/null +++ b/incubator/ml-workspace/0.0.1/CHANGELOG.md @@ -0,0 +1,10 @@ +# Changelog
+ + + +### ml-workspace-0.0.1 (2022-03-27) + +#### Feat + +* add ml-workspace ([#2300](https://github.com/truecharts/apps/issues/2300)) + diff --git a/incubator/ml-workspace/0.0.1/CONFIG.md b/incubator/ml-workspace/0.0.1/CONFIG.md new file mode 100644 index 00000000000..c147b7c819c --- /dev/null +++ b/incubator/ml-workspace/0.0.1/CONFIG.md @@ -0,0 +1,7 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide. + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/incubator/ml-workspace/0.0.1/Chart.lock b/incubator/ml-workspace/0.0.1/Chart.lock new file mode 100644 index 00000000000..1940a32316c --- /dev/null +++ b/incubator/ml-workspace/0.0.1/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.1.15 +digest: sha256:8f13af42bdb9c005c8b99d3443c5b350c9d99c45f485e7bbcb233fd14b3ab4f4 +generated: "2022-03-27T01:41:55.766322344Z" diff --git a/incubator/ml-workspace/0.0.1/Chart.yaml b/incubator/ml-workspace/0.0.1/Chart.yaml new file mode 100644 index 00000000000..170991a0cd9 --- /dev/null +++ b/incubator/ml-workspace/0.0.1/Chart.yaml @@ -0,0 +1,29 @@ +apiVersion: v2 +appVersion: "0.13.2" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.1.15 +description: All-in-one web-based development environment for machine learning +home: https://github.com/truecharts/apps/tree/master/charts/stable/ml-workspace +icon: https://truecharts.org/_static/img/appicons/ml-workspace.png +keywords: +- machine +- learning +- ai +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: ml-workspace +sources: +- https://github.com/ml-tooling/ml-workspace +- https://hub.docker.com/r/mltooling/ml-workspace +- https://hub.docker.com/r/mltooling/ml-workspace-gpu +version: 0.0.1 +annotations: + truecharts.org/catagories: | + - utility + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/incubator/ml-workspace/0.0.1/README.md b/incubator/ml-workspace/0.0.1/README.md new file mode 100644 index 00000000000..6509b850e60 --- /dev/null +++ b/incubator/ml-workspace/0.0.1/README.md @@ -0,0 +1,39 @@ +# Introduction + +All-in-one web-based development environment for machine learning + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 9.1.15 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/incubator/ml-workspace/0.0.1/app-readme.md b/incubator/ml-workspace/0.0.1/app-readme.md new file mode 100644 index 00000000000..22dc2e313e6 --- /dev/null +++ b/incubator/ml-workspace/0.0.1/app-readme.md @@ -0,0 +1,3 @@ +All-in-one web-based development environment for machine learning + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/incubator/ml-workspace/0.0.1/charts/common-9.1.15.tgz b/incubator/ml-workspace/0.0.1/charts/common-9.1.15.tgz new file mode 100644 index 0000000000000000000000000000000000000000..bc70ebf1d55c126644fb5be1a5c686c0ae1de960 GIT binary patch literal 43530 zcmV)uK$gEBiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYccjGpaC_aDdQ{bw5ZtPs^X<2q_r{}khyOa2&A3kk&XLo1k zxFHgfFs4Wb0Oi&={oQ{DPXZ)JQGO+vF?T0zkwBqPC{z^+g+h=lmr2|^SwO=)!EpGe{$Myd9Q+CN9{`uqlTilApZa%h ztJt|e$OBXS2@#5ucmh_#7EDv~GlC3J)(Q~~2u_)J_k9)z{4WsUDS>1SW(ffoBtwFM zXls!y(F80QOX;N7n`5@frrjV}_87@fAj7p)FZ&0J+uWV-sz zUtbQogK@Xt>3`E&LL4)QV?+cnw1haC036Sf|I7h*6EbfB5JTQyivR#*B+Ah*RFK6L z25g<8iAJxr(zv|n4!VPb)+3F-n*S>pWr#kI0H~e+gF*k`;IKIV4@do{`TrQtGtlXP z_bG}$oxKAzMFF1S00c=q!}E+lKG$2%z<-8l2D6Cq!siHqDTp$rN4iCnYX|N9u#?xUicyRzn(@}s9g7M*O+7E{P7qk7N{{Hx2I6%{Ie=rVbLwFdD zkEWyH!SqEiI-2hH8)J}WQ3TQ?!oj))#IG~)V**ZR?-F)K5ak_e31~lKf_}Ad&C zH701zD^}Azhux6m24(|jHlbI8ZofP14+s4hgOQ>4Aw;9uQGal>e{^t!!tws$i|KfF zG&>y6j?ip08%#%sqv>!soF4TL4pINbU<&)w5jvQShc8~dXoAC5q)th)WDrN&Qd-xm zCbWUvkj}dNW>^lDhuu+ksL4Ax9H9PD7=+;<90&au)7k9B=tZ!97@*N?ba*hHzCfry z*dNZ0!lTi6fAHdHJcDpJ+&>r(p`V=#ZEr>07%{p?61FXMb-ilp8psW)tIKbORV^$I z`Um0uXuprb!(b4O_Gc&@9EHb_gI@+J2X*lfnMB+8!09-6F&LoH?129{I%?MZ zR$L6D6vt>=O3PZ+R6dqa8xmMT+XTlU>wb4|kc)=l3l#2;j{2~V&}e^l2xsG?!3>25 z;b;~N2L}g(F`Ui@!DxVBh{iAWkEX+Mcoe({hQZ;%(f-D!w-dVwWpje)FWU=VQ?o|& z=Fpo8UsIzAJXg&*>^m5Z2jM=Pjt~2@AQ%l^4EKW>mwhhBK_ znuUWP7z_u)eHcy$!~U!vc*$I9ek)QhA;B=5ZcArXt(wRhZbJ&I;u|5kwC#5fyZf59 z3|$wt)H& zPQ;qHh(%r$@Wp6XeE$R^9D+nF_$h#dBbY|XdWmAT2SSLJNlXy~2?3NrhGtnr5!bnL zJ)0MHC>MsJhcE&#juQqY^duH|-Duc+uOJJ`ADL5E_=W#;#)WMX0)A;kLMQjlKh1LC> z#)X!a@C(RdxPmz1Q%}^ges2SYW@Ih_h`$O|t)VT{O(9`gpn&|Bkrp51h;kqVtuVz& z3>KJjxeg+{#7vC3{P3fE|AxPwfc;hrJK93Z)LbvPO2RFbOMUl!r9@WRP3R|Zjv^GW zga8;t$u$)M7(u!QDGsi1JO>bjcs4^MUyz45V0!>B(}XY>Gb6KwI0Zj^Je8f%kSCxm zez#kyVJ(CeuP>J{4tMCTfuofwp9aEV*iwbWRQAAtWKL^p^Uqe*<1mypaBM^jV2Os5 zi8%%M@K4toTDSEKoDs}bUbOaf7=2*`9=q*uJ~+`xfD61t|4d@ky7-?7_;_(*6_Wan z178C{)5!RL-yNUJR$B5yQ8Ud^jHET9Riy$TEtMrqZDl1Doq}K}cm~-5WR#Ef0!2%( z;(C1=Au39ykS!+Qo8C92dc3toLfM|=nJ;jeMrgu`CV@c^WRxXKaC#={^0E^!crok_ z#z)=pxI6ZOgjvFtkl_GE(HhJlTOckqam?*FD*7ktsTXGnVG}SOk1c}MtHm@4TWJy= zdsLrCNqAL6>zUP9lNN+V@FM7{7*+F)tG$||RVDstk^WSS(Ee2FV<;31_5SS17AsiQ^AOIfG|HKQG}I_g%klpq!k2 z{K#;G|0%}$43PlEj7xJ~@F*|$7A+I9t}QBieIj)?Uv}dF!5~Pom{l$}RIy`Otgzs~ z)?h#l5h##=E|M$?!4v^$E`%+h{xZX$pjo`kWhD$lEiwx*Jtm!oaj{UQxe`@HY*+#^ zs?3tp8Hf`mq%gNSlr@8?Fu3;slz=eR5)g$->e$N#z|b;{AVX$Lsoi!-48cj1QHIEe zB$D=x_4_*B5}r(9V95Pia2VzGyW&DBaA^R)#GbZ2cw81Q76?9G`7e8dS6Z=^ zwM*ivF&4TbE>!eM!xkSl4086!e0@&Q+J-8!dkUUMVMIi)MOOR8r4PgNyN zLSqPOo8AzHTLp5T7f@BGBZp5~2zlL!AutyZ2>}ExIlWYu`BIj4!TVH=pi<#`0I7e~ zi;n!wtyWR-LM(y#-1S07+A@f6fQ8v2-$+}mVHMT1Wxsu-a`^&6Oi;k0HGqu4V4>6) zmx9Uy#4$r;1_LpIXAy#w4;+Bkke~^;;4r4^6jF*PxH_VmZ74Sz5s6`RssT`IwaV=! z^I-zoD5m>uwP?jDTu#*A%0ti&7eU&ts5>S7x~hE5g9BXx$e*WYC$_tbno0n4KwH~! z{qA7c?+r(V${&)9A-771D8n(75fANtSNvbk;3b|pWat{MCk}kGa4;jn5|Aco7D*9K z`C^wzlY;ZBTDq>2OnL6sd|bX$0|M9r3Y(iEdy&hv4T=M@PWi;nE&n~Ke}tYCrs#|> zYxyFMuR@;*Hi*~LBwR}bU=VQ5Qd7qY001)_p>9heYdi#J$LHrizyI)R0+#CzXOZiK zgsQu5p|Fltm?W`S${NeO3oevq%dMwp;Cvl3_(l7eCaq`Sco*p9#xwBUu59hq1blOI z1G*oO;MDFrt|`BM{igK{oR}glH6$oreNU35`3*p~+ijtEr6k-l@JS;j`>#mK759uJ zOQVAMESF0JUg>8+DnKL(+A5fU5G|8E>B^IZIRX+UxW-Wgrbrg*z;KCUj>ttC8ERg< zetY)j_~P~Dr{gytUr#{W(@$BmU4y&8d&gST>`*9V;tGT4EsFd+Hp^sHg+=wa=kFKI$iCr!c*j%Nv3%Cfwd zpEzn_By?Zjy?^!k^4;;<*Lsr8Fp9ztXqHbp@#ah{;P^!7#z}}c637;4fxYfuAK;My`j4On=6#Rs<& z!g!8IlF?3%NELMSg%2oZLfi@-rid|ayyzF&*YfiM#d?jMQ1(u0Xt0D=2vBYt2w{a7 z2xF?1Wdc4cljM6$DC1M+M_KoC%K}ndgXOxrZC7stJagK{R8|!7tzFTQuNJq!yDfvL zpq^b_duUR%!hQAbT+@Z_nJpA;tH)u&sFGP=3D8oAdGcKP1MX6Y3MQg6X zGCnOig?XU~I2a$b0QmU!`242{==X=(@`W)sgEESQwZz$5*F8yMhQ6?F08=={5oUay znq-XP&@2ys_;|_(-F1V>>3m{U<7k8=N!9Sd&~_8%#<%d-sn&sN-q_%0(m`_WVkdmn zS$s@6O>{5CiyugmrTWdx{YkSljSy!A7>N&>u~fN}1(z^-?!1pbBnf+q=@PPFu^rY+ zZXe`sPFlu3C3uA+G`Bq;1i|oq9Ibh~-{S~Ld1`jDgd6xw*LzI^7%7v@0N@mOmk7j7 zwV*H}&Y0AXN`z-9SO*cR>X<2Dt*S1B{bsqBly$(d+XIjS7y}$*W=iaFLlMVwK7a8N z0muN3DT7f2k~ms-Tk4nb*wTA$4e_M|3bEMY%jAxN;&idL>bBHgj~4^I@e1R$Xelow zmW~{U5Q`XMNY(%|w4`0|nm6f`)*hb)Tp@tD;JuE)6%q#W#R3&!@K3U@q4w>`I6V>~ z(gi=F$TILikk5BcP8-RJo>+d+pmB$MmFoIchh+}Si|ZLlrl_>*-{~|F<kh0;vaYUd9gv0F8sS74|yc z`i>m1Ex9ak_rIMDOu0b&%s+kR_5-(Vt}$H*C7?!son%A|k_LWeU`r97%NqroB1Uyo z-4uzHE4b!n6<@g(b{uj<-9EQ3PR`n`eBpa>a+Wu6Is*{=cyV#2TEJAQF6|Ey;)#Fn z@&B9~)xImcoI?cOwhS6=J-7}l}K;H+G7nyme-amULJ>N?N zV+t?>3vMTaCH#Vy*^*;*@a=y8<=~*tSB1Q;U?Ywt$Wkzsj#kXXtf2lGRXuUW{Z>m_ ztk8+kahD!qY#{^J3miz_@eK2+kyvls#mF}lSYW{tQ3~hAHwmr@W(>t$-JG-&>&!%g zgd;3K*2fM^agVS1qXdQ>f@qSF0MQ;dAy9eMVrM#vu;)B4d$U zH}6QkBdi_lVO9L%XTEy;EZj$*zlTvYg~8QD@+O(n_wj2&67u;sB7=@{QjNb-ViMpu z=QO$J1!9CG-)UMPFeflTvn-0%kA%IzU9@^u(ig?`vbFZnVrr|6M5_HjDze149^U}? z*n@&vQ^7EldnX)C6*^{?aC|9A@e)Un=-rWTI7@z`!ED5OBH}P`T+(IbEl^d%qtf!a zZ{d~RPO<{9bWp;M&=EM6N`vlkbtE=1SkUcucP-&8c7?cxSjvD$7=wWZvuC+@#lBM# zN9+8vs0GOt3i*0hp&&u4A0@1vSSjgq&So?GMS|D5O%5HV4k6qCXb(uEh17Pg)C4As zPwt-=VpVldxZ+h`&HnB=UZxS+d6U3!3L_W?i0tkG{_{Kab5DDYPtW$iyCg(sGQ3MG za`RPsk-X8$6|udQ(Y>kzXCztiPFDnrNd>TkYvJZWzhsz5QRt0t@dO;-60KW>9ancr zfvV|EE>6FPOB}7Wm(>E%a_uvmf*CK0h2Vg8NR;pp%*#dVM)8{JSy~}qH^^8)iwy$Sf^$n5 zD=A(nU@L^I!yN)dEF$>xItgKuLRl`gct2PYBvIG;cAljIh81Y=nXfWF@5z79`5zZ2 zXUdHF`0DJlU0p6n_$ReAN#S)2AYb3)(Q|PK=7{BTUqqvDR{Hqijrc0GM808V^Ok~b1^_G&uy(A(m##aypL5Wk`G~3WRwz`98*3Ph zhQqNrDj_|<)`|zmlpz>`WM;L)OMgy96Jj*Fe1ugv2d7Y|rk)N4p>pVKWhxd~Iqo^u zMSgIOsVc3eq8PMMWotn(N?Q9l8kO3Vy6gU-*(&6a#RfX>U_R3{rjwFcsDh)o@ZM|{ z3SWJ-1e2dF!KHu~tiQkgy=AppX{@R;O{~?t=-td!1*h6v)uCj~%~eeTN1U2yy;@nS z=-faCR`d|}`O^6s+;xLS^Awl*CeviMP@Gbv>#HSKv#B54tvbHRvr5Ym; z&G41|! z&JXvM~mg-PBFvbA6;7;qPF&Wr5Q1>bRnEkj8~#4Z<)lC$^- zq$*4ex}zh~d* z=_=R*XqmG0D@^v3uG`CJ+n&%A?~6tHpK%lk zt4A!E;Rl=4EFo}?z==7UlM8AGfN&jABu;66?tI<@ z;W~y(9B_+FrZnNi6sIMrC77LR!usg^&-dq__nfE~0|F6`|3LMt43E!gwh#w#B8nu) zIbNX{P}wWlsdD`+7S3W6f*lKuUBQ|Xbeu)e9*7eMk}yX_K#$m1<#T6|7*B<-H?mC| zhFnH$=!fJ24h|DH3m83W; zZKe(%$_~w@V)>xZl9P)hDV(bl2##1h7Ux~wCU(*=Eg)Heb>HSr%|w~>!cLZFHJ3?< z%oNJq{!FVb=)707mvffR;t&ZHR0rE7}V& z*{zR|pvz^dWK7$#8 zj8Buf%C@2Cu_q){0AsB?^UXp0PdWdV0vu4iQA3dPm`Zd7o`Henv_AxEtRRV!IlU!s ztRU&}>QCJ9$lM`?9$Kb}xJ*IOrgo%x>01snTc*Fm0al~?uQ#}lH}y#tPpTHe4W>TH z;wQdn&KE6fTR<3S#$`?O&aTp`loYtuxf zyt@m_EEG=lEb|Opynpo`sAQR936=dh&^s9=ohdFdoRL9sB9@&c zsic?e_R1Lt3mMt2+#0-0dDYo9J2Q%B6*X(u;L6%>xB@o^9XPXo)=hmb&X#tMf70!@ zZ^H@yDqQf}a=>pn`p(F|R>@zI8GyN0YN?WJJ;o@C(FoCMg95lm;)iHuEpBy)fpAEq zh%7Os!oMd^LT}^KZt?>g;9C!v6a~W5dk24{mMzlnD1Y$|ID4sPhiGD60qyOUPRh}+Z+((G zam#f_XML*RE4_8ygtc^89Wk+qznq=sa!j`6M$gfZ8*!XN@?jG7<%f5wTX{ybKQRA3 zH2Zo-T!q(c9&VLMuGv`2!kY(Lwcc=)i%_3NxJp2UxqvbO(Sk-xdvC^~rz1KJ4-dVv zPK}m~z$g!vc%MfUUZM2_WE2sz0S!!C-g4cUlO#)f%XP;TX>Hi{vaWkkT$Tp}e72&k za2(k-5_MCy2aDl)*Sa-Ik=V*g(^1JE_XNDB@N`5=Gm4#NUdS_C`?K*$HZk z?{fD>xKExv1MdkCTZbURlvzpRr!ct6(o!qdYqJ%{7U*35y+!-OAF%x8>~jVS1k;Xs z*Aaofit6t;U&viJPVgX!DI*Yz6z5whF`1wd$MX(a$xxggq!iC%k!&eWLezT}i(A{| z5!T%n|8?#hXtnr`0yqHC_Xrd#X4IPAcf;f{W@+tPn|kYq`kM9F-8 zp7JSqaz{+{33YKWU7k+Y4Rokzp_3DX8wyp;QI4aT>zaa|yflYaqy_A@OiqPK3p@iqBaqQdTpB`9kSv!d4n_Qtm7FHe zC!}i1!xssN5L_u|oybzcSw6r?MmgkQkzgxYkn51H%xwZAngASgT_DbtEx5p^GMGPj~h>MFo0K7!**nLIg&9 zYIOJ_Sf^r?;VveNUMOOERNPZ-yd?}nlgqreWfSH3>Fk|qz6(xSgQkJHR!f|(!|^QH zQyzgNW8iN|M))G1%E>(GiP_t|I-(uOI*Vi}W=Ai{NGH#`uWxbh=v&tnIeO2`6~moX z8v7kXRu1wO0ISqKkZ9Y=yr1H}I^SJ&DyVDET+y5mU|(-+?x|A+?Gu3Y*I>(X)o0XI zgZbK1ZXSjxW*EvSN|hK_`*nC@=S~_AG3z>T*TCS0tnxwWr0a5TE6L{i{DQU>jhh9S zvU#xL6^^3wYs`X$<(Nlb#ElW5N}5bBPtR5(6Rhg{Ixgl!P*Rb1#Y%FiDOgDLT0uj1 z;6brgF`g=ltlY)s2)4||sq-7j7-;Q3OJhKBhyrL`^kaFo#EQUiXQ`DK@0GktY$h)r zGXaMJW3}8{IZg<3ZPxD?VJ9XTfM<44GKyEZi==#W6DUO%=T~%u0`YS2w^|kn4xgGi zELUr?^!GS2hkD98O5RP3TX}(e8q-2>uG;eM|ef#6%`>S@*uqx zE*d2&a|cU6N@OF>U}!*r$ZReQ;; zv9?ofULn3pze1GrQNT?&outTWUA9)l;k6ESSAIb?A^97BZ)84mY15-GskrD1YqxJI zZ=*Ic7=h0?yd)HU*0R_^>0I5}qm918L0nrL<|!!hvlK-I(cP$#-Lz*y;8@&l4jL3v zN@*k2PU=(^-g%)37!3D^1M961Bj98T(wS8iws{5|s~xMrvu6*I3r7GZXf~<4faeyu zaGVD0A9-#Zus4ZQr?fAyBtH_Fj4LU7zUQ&L&GqvSbiPmO+-=WKlAgZXde9DbOiKqT~v1VW`#H zOS=6!Ysui))Kmh^EhPinYbM>&Dl$NCWfPg&k7p5C6!zIextU^}B9#pG@xvS5>o>_2 z79TisxWN_|CbNX#ow+$eDlGt2%Z06a5hePBph+B|j2vE}_idLK@UGWY$E_=A`rFNm z7%{p?tzM zGs_syjrs!iK36&sU_#@aJqfBRK;c;Q-vR^Yk&H^ zJyI0+%&kMc%lr=Wvn0%KFz>Q7x@8;ve!o8+jl{qGe!uwdaDRO8r@?4AI6N4S4u-=& z^@si8=DAW)S7%H!tz(!i_<7WDZ#N!bhF5> zw@(w9UQRNH3Q1B4z4($^U(=r7b?z$tZtL6L*RQRc8xxk(mIbQW~+j-=<`Ji#nJc4OMMr%fhsqs^?mDY&~|gVq&}!wIOEQLQCnP{!5hP{f;?yb}UFwJ7BQ3GIYz&N7;`bnz=&7X z*J6mKE=2FtjjI4SSf?rNtp;j~h+}(mQ_=rC(ul8r6cqrlaQ6+Aq%8Q=I0I~23jj+T ze?TJbF0F)Om9an#6ae^TGl0B|1z=wRK#btPCbOUEB<3e)A3ri2;eQG>bcRU4&7?Wf zrq26#DL)jv8)(&)c`YoYr)ddm7AM$sK~z3v8Lt=K(V@x{jA&#Dkn*(7ul8SA4ZX_ z{(IkoA7ny!?IVYAXs-!W!uoG}w#`t`U*h^@rLa7330f)-y*6WNq4Cw=xef7;ELzI* z-yAczHz}}T{tt$O{lfe|*dGs{=Ko_nV*Y;+Gr5p)(M$%N8%~FAs7rvWCa~e3s%b3m zFtAcjLaPmD<`Edr5qQok?1AU``IpH{Vp;qJR9Ieeym;d!eA{-#wxp8NMFOEVJwnC_4Wop0fNmNhBXj{tt)a zqWyO;>JOge|6@G0{vR&XTn~`&XbJ{7Hz(9QULUm~vyI!wuwC2hTv2Wc>7p_9OSl3cS`W%+Zn(D|(mi#wdM%A#4Y_xaND-2MpNLQbV@uFFWq@B;!!lN2b z3rp=>B1q5_$&l$w+vx$D{vEZt43n05<6V{n6n;QU8wz`%n7+F`nD#f5Ra6YXBIq zO)LOY_{jwL7cc>cZ~MlnskUwm8qX;skfHgSuV?k5y!`=525kF)m>TxpB8)?@6C(>= z4rI6VC5a*&&p)Q2{A>|z25|&-#6+2a_Pc}u2v*{BnyJp#sSKI1CeY5G>25o3Vz)$R zVCqXQmAfuCHx^nA*pb+XgQ8nP&;b2X*VCPZfG*9*9D!~Y!xh94oJPoyz-eIOF)6G{ zdHYNFI!yci_5e59fBPl> zPycZAWdA+JBb?i||Nm4S2B`J^gDN9VF;BhgKfm9$q32&8P_X>|`c=W}ubH>P=dV6n z9)AtT=kE`7N~E$UUz!aGD}Z#I`O16{e)*lEn9+!;+i2V1`R;C=_us{Qqwl|SJLkU{ zKDWK5j{m$ma9dWx$;IfGJ@A}G)({j)$jTxf&p_AQS!aJ#{c^TYCNIGb(1zHbSDinv z+MvxM*{KkH0WO_Oyt8Rr#@A-4NzrN@#Elpg?4HsH<}~y%LmlRuw}22~KZ+d1ZL1wG z*@}#S2wp9=q(`q39a*rZB4@6 zymxvq3cXVZy)4M9jXlvjr>edaxM^Tsp*8h%;a7F^wG7+^@b4NTR<{4t*_yK?!om7p ztiXEvZ_pnPMg{wCJUl#jvi~0A5&pmLNCJ>hn$_TT!)hPcc<0 z;I++cv!YO4w$t)aIRd5A&q2y@4(8`&yH`izu<2^xI0o+FqP=l_U2Dz;Y+{j#}yZmf!$`4>6? ze`_lZ(EhvK-KLOH4dB-r?ri`olsk0|Xw3IO-c~auSuvHYg%UEyz;jDrbFB_wNzNCl z7E5g2dmc+0LY%X5KHzj(`jBIc)9<1rxT^fn4RA<6VG);3!Ap7Pn+Zl&#jRulI3&^) zSPjW;2Ym@p>Z~o~8`rC)`d(eB)7<;$U#^wkcov>O%AOPkCPygP1v}D8;^f&abu=N~ zYF%sU3lLRBUVlkBLkMqSaXBakzc?Z#IEIp%^!3QtYYmSZ)(E|NC?1J87+SE)q~C;| zO^6bX*2kuZ+VHl=_7<#TYmY`uV^t`#OX;J_C`E{ZRm{tRk~HXBqM}n-$XOrjL94>G zDK}NszXKoDQfMmUF@3 zB+HU!<1e3d+mmj4(rt|;)01v{(rtfa-S()e&G9q-);`Cw|IZw6d#w2X{qcU$|93Fj zA3yp39^(=IzjG8MaR|xUJ_O1|s&?c@2@DY_o(mOQ!IdsQ>zJgo87w!O1swE+Ariyr zG-im*L^gM87r1hpv0SYUy1<%|ec&AQRB4+$32^bOV*lAb9xw8+ck`@)wsR6xh3E)( zXkN!e9D2k~j$xj_y%sZ0WSzdeUBq*h#^NFvck{-J-YSio;Z;miw*}dB)#gOgHJYJT z%oMf-YPxE3)O3vvsC}2=D9ld;E@4{F*7(4=+RMw`r8(=er8cN< z(J5NnrURxru(XJbj3uo=b+@?DE*Pi8za^~66b4m%St=}2_cSc4xUX?}S~)A@fc^9%BSfB#AT zKgzRJ{zn)^mVWq@-xhkW2LYwY=?M`MoLPtrvZH{+cbGAerc#`2v7&)w2$8z4;6oCj z-_gNAfw+5Q@a7H&2CG`w`n+FBT9;vpt33H<@rT}ms}4m{0J(j9x8eH^$03gAPoub9 zGbD+SN(2g1`~yj{w1)C6ofOobH(Q6qWl}gy#FndsckcKe1d((6r)%RRAJ^!gM*Rni7`jzYb z(Iu3a52 zzXC~ryQ6-l2Tv#cZu3;?e<&AP_hANXvi}cD`#MSiJcB?Rn?|#>c$C*%Qq~x>l`g$5A-n!=nh-d!iaSHde z2G}tFNBhG;(f&UiKb`-5l;;-t|IQVI+;;|GCqPCOdA>5Hx|&+%3z1GfeP@&7^z#W8 zH-VtliQkb6`Mxp;)&agpS@b(i0_fzfyGtg(_wg$fp$E(aXiudEsQ@$4-1!y>0h?v_ z+mtb|n?k~{xQJ81_U8LDr7B0T9_Y;@CgM{H`rVe(y*__mY1&n#+4Cg&tDJUEnfLNh zTjg8M7usSep5HSuL#u$9pH;e;se>9N68dMZScGl$@;J2 zivLZXlKn4(<9pU&iQc7k_Te@wf=%}Sa8StqI2;T|Pv?Ig<&pNkHvL(mZ*?mimPz84 zzV=N|;U2)TN(+Q?FMh@KZ*#mt@#eeVN~dN#Q9#w_akQ_m_boV1Q!WqW@+0p_eoeb_ z;lnT#CJ2m9^e2<<@kZSerD}NYg)QRSHKnEYnvrBFRHSnZ#e(VhH;q5o>S-CdwrI3t z6R8BSOwsv~2c1W9ay#O=6VK?`N7h>{r_~oEc zUk|J?RrRDw*JCMvxx=SQY}El7*LH65DOZf50$o3ZcA&C440DCnW-~=`ZX2{2$xs`# zmq`}0GsqTg(C+Zp;-=kpkWrQ_+n~L&a8nrU){!hM&jIbtx5!jGyQ+3E{2OW;;ZzW; ze)FnblnEXHx81L5xLZ|jHH*FNZZ{e_Aw|>Cs7fGt<4te75l$5`Ytzk^Mngg9eG6V8 zhRBl3ba7Hm-u>+Clm1_EraIp)m29*Mv>(SxqiQ$P#KYSufIQ<3HQ`Bl=G*=taJ1p6 zwZ-Kgc)my|vvUV4==?RU+~eDkD+*D$n?kmrpucNzr{Y%G7ekLW$D?gJvs{iKN0ZUoj@#C)2oEAP$s7G4TxLfdf|>aVB#W0#;bp_nCP4ZePz)D&cJ4!(YE zOPFU_6v?Dd1#hHVCpE={LmLGd!EDX#ZS+MXNFrH$Og~aYCZMl>s<7#P3&pER%Tf<0 zUcJF|gVNE3iq2a&DcV+K&X!X$~s1vV>4Ft6x`kj$ygC)J>NNwIk)b8Y#%)B){I zM_2~@&pV;oRxMQmP-%5vVPgCEdTr-KNXa;}T)A?Q@|Le_l-HRNycAA6`;&~jwPJ0% zo^h0Eo2rqWW0o)DnwI+xQZyblEq!ichI5uQ>pHn9pqFqH&?8C0dR>UUQ;%tLqM3tL`8tpGres7`uOHQHABh2L69!4+$5OsTi9ec9h-?@a^HNQ)Y z(s2bTMmFdy7e-O9C~F|RHAF@FjVkzQ$@e>Z8p(gDs2@)L?-$p9{n7C0{Kum_M*b^z z_6|WaL{J>ycn;>6<;Kl!VG#&$%o1w@MY_$m*xm7a+#f?jY;EgFMd-Q6VGCD%Lz_Umi^l#L=!MP7;`1S&{FBP4!A;VW3Nj0X6iFxpS*g1w5Lk` z>r{7lcK$Vx|Km}~{y!K##s5FbW8}X{qeh!rHpu_};Xz6M zkNQvNKOW_&ivP0n>ON-hSDs?GI`pfQxYr-}WxDVnQC~ha_rNhBQR)_sHZaI=;KCR842poU!U2aU31GBHC^K)1$6f$$%-0ToE-zEa z7MGW5t-*hY1w+LVf`2m?MkD$Eu^@b(xYf*305Sda@z z$0}%-0$X%vbTI{~6fRN?(+wOce6EOcMSe% z;Q!wrmezm$;nVq#M|o=Fewi~w_tR5&>g2zg2E9wkrVqCM z9~_Q~_TTW}>He=rd8*{UJ`N;@9%v;1O$v*`k~+eafn?@gTDM>viki@Kx`<0s>3^Q# z&6^8GGW(bOi9W>i5G#Jw_9HI%O>ehe@6$Ub_R)Q%_npk=N!R?oo<{QjVe>!iAC8Oh zKZC)+Q~dX%Jf-uWcisN=NXdNnSAFzt{;E$K_I{mGO}2iW3U^EPutngveslic=a+Ba zzxw#*^%lFvoO*xE4P(wf_qA87sPORH#1)$iy!|U2Md#O;1q-*e?@vFx{`vUL8@sjk z`*&@t$cOhIFJ4~`oDze>VRta@_PhPwVA%FwbS;Tl!4zL)Fy1?PhdjMJJzI@j%w)4S zH^SUfS!{O9g84^E1d>D-L>d*Ceb;~_njpdazri6DVena1?VZQ`m$4VIXAAer8 zz2&-Kx7f#fA^zAy{BeQ$gWFKQnoAP`c6{h*v71pu#B|@SFPB0}uM-kV%Ak1lJxP`_ zRzccv>XJ~f`DV_7Pgcu#3;A+9gcbE*$LZt_jV@h4g2JvTsL3dikzZ>#)pB?^V`SVU zrQi#0>FAnGf*p9-2(M6#C_N*|R5awgXd3U(+0e>EMpHDh{~k8~M}IsRmg2vk^8Y^0 z^8oojifhNtL){Mg+!i-YBfFnhMRtEWdv|&K@#4pc%&1;aD@{ahGjaPXn2tv%4t^hD zPIdF&_@(dY0o*wM$L09nr}&@8d8+(>KkKo-7Z0Ek8TE3*+6M7^_i~)>=-)FgyHa>$ z0Taj9xBCDdKC91-&vf1E_&1#Yck%#j^8bwYi~4^sI(Ulzf0W1Q|9o=Y)dS?6J-H9a zeD-;P%*PFWphCGOo}faNZG1rocCJ%c$%! z`a}ARemZ^g=KSZ=i<2Ln5f)*9mF|;~aG$t-qX+S&j2ik&5?x7*QVaZbUY4a1*wNs29Vcd$4r!)Bs^vfW!VrmJbQ&{6W-vhX!Tf)t zQvBcH;3@w5QJ$^j|7*n(!0<%1638fy=kmVrljAq9!4Dr#H;ex=&*c%}g}quVnzv*& z{_?t1TZ)~Gh=~b&5~_W5M7u$ZyFnbxx;W{r25lv?lo@@@7z`GCarz30{BJmkJyHyR z>2N_-yoOx7G`Gp>D_y0yn}Bb`SJ9KNU%&Y+EWzseuWuT=`vH*p`9By8$HU_JkAwZE z_^(HKwzmIH)x~iSVf~pa#_q%RQ^2;g{Oo)2?rirJFWLJYSba8C$~K?it5F(M~r5uUgy$dfn3y%AGgC}ha1jyJE=yeI(O-Ms}b z@Ax^;{-C)76z+a3a*dy9HcuAs7&()qrnn%oqHzHsMdYS4%t$nP&fqliib8uU!dw!n zE2wj28qP8duL(z=rpktDE7aS-J@@X2u@lY$`TDE^RPG4HUpjy0yif&Yx3m;8G9Q0I z;aePr5xRy%3h1^UH+i7``(gzxMhiw`0kFKZUjiz%>Bwx}qOs!iYY(C?9Y^pU5EJ=7 z#au3xEfTMUUHdAV0H#1$zakPNhG;;-HrRD>$~RjYqGM3GYs2}n*j*wQhH+Ung2iE3 zdPiir@HlIUXn&B(c=bW4PqLw5X z6SpifvQ85mGupNyk*W2;zUA*4O~t;r-i&S9j5W@x8GGbQo5uBywJkhpdUb7YejA-x zugr>X9qLr;KS%mmT8ZhQWl<@6s*!puvTo`wR|TL0#GTT4o>L2msjTju&KU`aJa#PQ z)Ozkx+apeFnVQ3-0gTWI(zjUxP`YlWAl~f%FRUZlERr`)bAjE)UjihqwDvWYdrv-~ z73LGxD|PVO7%@2}A`97W+ft82+a>Vl1#Z}>+L0B-B=EEwk z1Glr;T07M8s&H%c%wbEjAo7{1opOy-8T}qJ)xGZAVT#hV{a!3y8lhocnUz9Z#>d9U zsw#dvD+~`#4(Cdmr+TAW&|D<=^)kNA>qagVzVq4_;;n_Lo}5j4YJ+7dYb>;qfE z41g&Nu239KoR^!C0Q$=OVntg)X+oFk0&&BBxhep0wwxj&tLJysmipmXHU*5{ZEm0D zjJ2_;BFU|aJx^D`cCPCCaqTK7al*h3 z`o&+e-Dww`WE$DB*HM3|ZL&y&yf?<9k`TulDYWV@mP6yKJ-JZxvRpCFz`u&q&DnHH zh-sT3264RQuD;bpRbQ`;7ARVF>7u7YzdET1Fm6x46+)@+qJ_J!f9lNETi$iCak;wn ziVOw;qV#PNB6FjpSVNdzoA37e^86aR;o+dD|DX1MAM4p#|LZ-KhtT+n40mIO)U4#h5L|9Ek6c5Xbh z^$uE1c6nhHrNIJmIxQGWX@yHuVxsw?*!Y_ShTp*m#sMM*2R;x{H0@?F=B=PEoAqE6 zCD$E!E}(5scgyEEY{G6l;_ z66jB|y!q*9`$D0c8#_sf_IWy}=~%aSf>IVLg6CB!@fukrU8leGp}d#lZSC}|y`iLs zAu8}HPA03Ori1&=LEcxq&LgiodqLoAhJ*a%Urr$Blb2GS%5`npIGzhz^#hFOdRMIK z>!eDWR6(m`@s2xGn+Bt*8x&D4agS&6_FGw|@X|H2eHH3~%0NvoX!)s%Dte>A$(lv1b=@t@7yDj$TD?XlAe!Vz3v!Vm^`w6%>Icxb`_<4!E z^B!c2`(R!OP8)fJ+}iTcXGfU2j*@tngkpPut5xZ>lDbtO7psrEyQY)+mDL6P%F_9M zABb;4$askuRqE5-s?S^j?kXu2p@1c1;*)LiQ^hQCKPzcceZHegs@Nk`ZO59{-qf45 zRhupwEP+a+{B<14K!f`>%S)u8*_0xEa1|PnY0lg$W3w#X4SQ=@v!%4DlQ*(ypUlaH z$x+|l`>LKp{vGOj+8o>H|GAV)w7YnLHl6?6FW&z-I6NF3KKXwh;}QO!4~S(XR+lY_ zC8uCr>GM%{IJkbF#=e~53g2>Hs0ni>X4K@R^s46H{qwNv%)?IIL@Y$zo4h=3!*aS+ zN8(r9{LlwG5sF<{yY@5{$uD-aQ|4VF#fcX-P3U!PT`Jt6wx9WH)U&j$HFIy@|%|2piCpZx!i^7tgUN&Fzk zzn#0htz;hZ8z`q~QA}f*LpS$)KB&(9{CKBXZuD^~>H81Sm(n4!9U;YvZV=SHJ_tKVw*#;XY5tyLbfg?Qh~->HTRpv-o?=!3I<=5LDj?2R43 zIw!@jQ_TeY^+g)lmMynwMGs$sojfd(7kXY9-YLraVHCa?|_Qqd%*Rz0lu67RO^j##$6^9rl z$yJtu_G-`uZIi^IZMWObYqaxzSrO&DV{RyUfzM1y+cq>WUwX?G30W3Es@Fm~Sdi_> z@UpIsZbYALDAUKDGdoHIl#9ts4t9?mJF$S!E#TC!ms-7xxlo)5*7t(YWUiCO!B(N^ zY)!eon2Jp#e*=X>FezMglFw zGHtVGTMFSKNfaqp3xRQX9Hk5RE?a^FJJ3cWQE;9*ep3_bFX`-r>A0Ss!Z#hRF3IS8 z%Sco@UNPzQ{=Ay}c_m}>Gzzj&30?x)-JI&Jyeul&{}G<{0z_EvlK=PoZkgZZvnl>} zFdP)^|Kac{|LdbXKKmaL<|J>|(JtmBP2*q}BTd|NSctG6lPGjD9b0icRfXO77~kb% zDip?hIH~Ovs%oSVHLH&+RTj?=FYS8wTbrTh;&!`Moj4^|W#z7~Vu+Ml>ExhIru$tt z(r7#CwgrN+6M1h+=e>5laaAhlq_k$^YzbEoNAgHJS25}q^^Q@Q8nge6|4jckZi9BG z(-E3>>&pk8J15LKH#eYsIL+R;*h($QU3fP(hegz=9Tw4Upfre|5MmcN_zA5gA$|oc zIcEgN^Zb4RN3n2-S7==ak>C|%s42*s$H-3p^gQ&lLI2-J`lpTg-v8iTd5)qH~#1_6ni& zBuUqn*DTj+I(}AS!C}2mg~jhExS!Bk?(XZo+>IFJjhWzRyQh~aK@`O-kN)r2OGf=e z(z7ThosE%}I}B2|gDbQKi8BoKgtv6U?~at9ZDGgR%;Z4T?b(JNJy$3R=D0oL`68#DHl{hJ{bG!L!@71batUKID>cuF>Rp?XWtpZ5 zsY%4=UX5^jG7f*wkKg`VKyCn9uCs@X|LKp1rTp*X{ipoDkMf8+woc?ZE&C{iJgEU- zKoTq2XXV8|7N=Y%WFq%11E{EzH>t~`Huw0 zpuGp$w}4&YJ8epXExZ34h{?M7?0(OTp@CjEK`y2?=OSy;6>Zx zjoV1kuA9n1VK7AuI!$_)no{5|P;h04L78lCy&XC7?4q5*UT?E5IcfQJ>nW(BU0jVwWc^oOoVY$wJFjs#0r|;VfYc=P2w<)uobpFX%ka zf>su@=lZ129VlBOL&uBXhD)=p1J&iaIHnB70djk0hnYP|*MHTgPX0^QdGP!%qr=0Z z{XZV{pW;6rk~^_LW?JGRA9j$|g&w{SM76i>Ebu|fr8{-bwx6h-lriWTbdsgO0v ziRtiwdI@&SSzOO&y=;)5oLG+C%5x+6szj&x;%Qp!my;|Gz<6K$iI?Zu zY=*ypcBk#P!doXIV-A1@gIN|uYw$}3BRs=gQKYFDkZ$W|B%zD)jJLrDhk_{zU`7$3 z$r6bLoRsQv7-twop*(UF;U#7$l-H$W3U;PzF~qOlo%6Cdo{I~5ce}0A86Z*vNFeGC zXR5eCyu<1)_$dMz<#E3PTJ9#`@S1;D9Y|lYEmLWMsZru`?hIh# zB`A$VeEt7xgZ5>6d-RbiY5(t0 z9uLckVYec`d*6b$h|J|Yh>`$CN(HJw3B7bs*&gLLC3z|MwwDJY6!=`9uj~S=spE_# za}*=OXI`36HYbSw5`h#_dYzDviu2IcvI?HB`C!7 zP7MkOjoMm5f?+tlQ)>!FvAsr)o4Wb06F@$!|980G-yfCyzlTrppO5kg>*h|=+pqUl zr5vo5k*Gj9D;WhbzY!-?p?9^lGKz?&%1*MxEMM`-n#Ba@OWx}+uf5DD6O`bqqicd0 zDq>|f=YTRXfnCtfk5*`GoR)l+M@zuzeG5cEkS5`A9!&5CQzjEgx$hj^_jvmm`aF&B?Rmx9fYMfvkCxW)3WB!)CE%-1oUcm!D*R_rDluZYiMXy25r5C8EaoX+CH3VE4`qOhFEh?Hr1$vei0vky(WLOSSu3O@tVWum26{6Q#g?hawN`Ahq6@A*5w+`Z@Zv0JTB#`tjTz&& zjJruXQON`)v#I#$(T2W(YLZ|!T4G+9w-{^Z7JwqUj=Cz1@&?tU2H0nwIW068T4!KY z0A4SyVNEpys7?f{!pw`I2DQcQEoU0UYZ|~vOotLIi`NCkC|n^xvowv+62%Ng zKaeC#DPRc@dshpY*+rkzbXAbJ5?)o9yaZfbfP?Xo)o;OEbGJnPHAJf)s=m$Bto%)5 zoo0*=8|k2!A;O2*>Vaww$KD=PjC7iW=Y_%cP{rS|m$!vd;NIgjm z+c9!p&_{hebYRd2!#)_6)6U->MR92QhqI5HW|}VM;{b)!VH%-J$;fOZ+Vwv9)pWEraPh+G@#ysVBJ zBO%PAG8(8T8@#hI;8Rn-Q>!uW{bsw-H6kflm5oSEU<+=Y8EJ0Fvoskct6k4n3V^n! zn=rbCKgGQtuX>!eVTqw?XUK~wU^$xQmWH=wiD3ht7;a*U;a$06Sj7pB(Nnm;MuI9W z8tb@289Aa%!HX}l(wEe8^$){CFk{IQG917tT8marj?XUNy}r2o?)2TO%k$SCKAoPt zF01Pkm>!3rN8tt;Wy!Mgvygq2U&D0_mpG{WuA6>ElC-YvitoDdiqCoL{sJ`?opbOF zhG9jIU)};hF~@2n2qEu4MaLT=;ex2b!jQbG`wl<6Y+P@P_6mJE*^1r6W;5o6om)4yQt2 zsixd+Y}pbF!?uA^UbgzCamih+B@ZiJWr=L(Gz%L^Ud_Lu|M7}1iR*npd))ds{oiPalnc=L4H^WW<6$A6l*hu$S$2&B0LxJ@+Z zhWPLO{lh~3@8MuPe7gVVQJ&iS|Jee8X_O&(Mq`!`@n)H1v8@!qKawe63n-j~B#T>9 zG)ss+CnXM-N77wfb8DOxNaZq|m6%Vs#+;qxvOjc2g>x&fq&3W2jioazIgC;qqf`FAOHi6n%o4H&U%yT&3NdKzZ+3=6-MWy)$MhpbWCHr)MZO_1k;^FY zwrZonE@NAC`kGH}LF&H&=z!xlZ(0BlM8!qf<|bj`3Dd}%ueML8;r+y%ZDAbBCOe?r zo8q`f7j6B!6PQ0yut>l+$BsWGNC-gz<0Ed%)^7Kk|G2p+-}?c>kbhpK`f{%CafA%t ziOXseChr6BR8a@JFcrnyK-{YvERyRObUuKC@zLa9d<1%{H16pZ{sRPyWfJo5^Z$44 zegnV$3S^&TnHj|TGQ(9Gt1Q8L;?(gv$@sv>yr1vBKVOZ&@yQ$d|A|gYQp%KQd9Q*&lDtfV>Wm(RK2&2}hVu1mJ^mXSHofCKAk9$O zlZowweDEPw3@E4kDvc#vHAxKS6L)m0e4VbGtQ;t(&EjRYPOCnux18&^#AljK-H+-; z4xm)RgZ-0nTlH+T|I`_9L~ef$sNVh?3=YPH{7=LF{^%+H-=jP?@=V$Vx9cE|ff;Un zPK%H5;sm1NR>Oe%~v(=?ZSyfsJiI9C(i+|(Etn^x#DUqr4l&=*GFF_}}L z9*kCyFGMZ=x7YL$h1@-{TlVQrJ#ui$yYt&4W_~c{au8#RX($VE?0gb$D*9FosHwJ- zx3ED=tweZ+f_0$%Xy)hLAv12I#&Qj}M3nL=W^}Ig@ooNXVvWxBz^&=&0dLK0pNkE} ztBGTXoP9ifrDmY;YP;j6hM~(#xf$Vd2p`X1f4ICekUIl-dwl-WW)PxSEsV?a*B5t$ zbM`|`Z)z6i72tmO@c!dj9ffZJ@;;#X1aEPRfgl*ZkE8X6Bw^far)$d4(vixgDttNo zE{S;+P%_rf$Cn>oAHTYM|L)CyUw(N1zA#qpLE9g$sBTu@DTh6knt1o=^wsI{<)_p0 z)9>EAzI^ri)9K0U^FlkT1c!N3mT)aVdG+D+)9VkHC&y>U-<`fWy*MpFf>Gqb*}%E@ zpURQC_@8o?MptjdE6+mZY7abL$vYgJg@K74d45&+AOltTmsM#g;%;2JYZ}+JL(nf7 zCMX1L6t6Hz;w2Zdd3>Wtl_hoxlNngTlD6dOL1|p z>}IEce(_=ob@_GM?q-2fFEx&ShqVu*hlr~i}tGOa@4(5?TMo*2KsW`0^;`jO^DlNw?*8kyBYDKSgf3aN7YPTVp+u~ zC|-#`L6=FaGYO7!UVT#i)xVs{VzZM|+{4)g2n8CHS05@>Rr^flQlu#g@N6v_>`4%_ zgaDtC@ZCdgeu%$Oywbd0-cD8@-R%mX7|>#(4lu8B{&Bb`uj6GJn^}REPdgP{>bA0x zJ6+;>1zJTeI*xv`{x)k z=Vi89sal8CAx)Ag@?&k{T6^ENfJ`1E_X;mahTa{YgY%Q)H?M)taTEd(pC8W>*-2iq zya&UzcMCXSPWeZ@Yu6TeOhuq?$;AEDY^#Z)b~soL$VAoVuPU~K{Ch{wZ@+2u`*c2U z^#3jr%2LRJ#Y6dj`-6jn;{Jbs|LOkE$9W!k|Nr9stM?NSq6jer!X&st1O&-4O(>FY zMJmlWKmh+2UpfH2rv)%;5A%G$#c9~VR_AdCp|92xueIEdQc`z6@gsApf zzknX6buXhtbV&|zM-OoUR+I!+9F|+E0_5$%dG%w**#fnZZrP>*|Io=O>F5uhdfqzx zpC;j5GXQSb|LgDfi~0W!2m4R)Uyt(0{lC`5LZnBNk`)UnT)qF-Z8h2e zOq0;g|K~XE%r2e0f?rru#do#a7Ui>5Qr@7mh-+2WYy+d<}s zqrjaa?!vU97Z#k8D5DIK?=hk5XUrBq%94e3XGMjwiSK6h4`X$)WH*r)?s~omj^s8M z@qMKT60YDC67sEgQ@7lfpoaQ!_f0@Q#-gnCVgmm5_j_#0?moA-R?!Q zbJN<@8J01-C6qjoaSaGQsdYB=Q+g_w7hcJsmL54Z?KS)J@>l0zr{j6lhorC64d7R3 zO>3I@6=X5~1^fzVLYTPjb+@qDl!w{qJH4x+xt?xoFCvHHh6{so$Z+1CN@QOKTH5jO zQ0OIqGDCyso7INTf2rnb8i5_X&r^c2D?ERjv}Q?BGJK2HgP;YkuxMj%!({FNW?qumIRJX@djb4%EN0N2_d;%VUjBkYcM zfNa|TIUJSl|34T$-T(P0kJ$e?6ZuDs!%yFH=Q#WtxckH|x0P4WWHO4}^iKZc?}fVu z&DkgS%0O4+rYaAM%AiuCO+`sZk(LTe81fzvm55HgleIfls<+A}l~>21FT8e-@MW&t zK-1xWR!XiLoo2-J!|JT)#dDJ+rbr<7V1*UHa+62H*oj?sN)h$>M{C#Iy=m=zM&yPb z1z{pg8JeYnEWEu?^+jwE8em?1Gke9Q`6rtYct)rI8!r%pD7cDsXuD{F! z<17VIlCUI5THPora9EW8B}snkq%i?#x?>iz%h zz59FHHqtQKpZ!gsp9=XLC~_1Ro}Y$rYMcKg&22}xK}1WQ16v`x?7 zejeON5F{j#anf|3=!e7-!NCkJbHmI)ncU^ZN^Vr`kr+~1pevgdxILA@Nb0FPJ=%++ zj=mPl!sGC;b`$?ejPA`QmG>G8u9IKOr-XxO@=A$A{&%T-ft*;A{mDiZ>1uUn_NE_q zI)+B>fy#^OoJlOEQo5Y#QWjdXuK?|2ezeDV#Q#WgNYpqSBB6{M__Z>}HDs$*7X?iXIG+ZLC@Dv~fvQ7xj(H1nYFuf+> z-F7Or4ryu54fUj^w|oqQI->}veR(G}&7r5e;npoB4OPSj!1x@+aFZWn8PmwOaj&Kk z*gmWpJXbl_8M;|!h%QMSRbksL_5{rE3XwH)qFjEyC(yKfnrFi-J+6niryWuM=i|u# zo%){{In`1N+@b&V18->8fAYrO7ya*3e1wVmR(e;rcmSODd^!WvZF7JB>wrvmxh&32 z1kjSkQIrii`KGW^kHsbwJssK(1@wzqdGKj|N4zNECp$842CwN!S8Uc$N<9==2!`8J zwl5%T0o|)WE2A&;oKpGirwKAabh@2G=?k!`tXLIRij)^wJ-vjIfpw{_idl7~x8n@L zfT1&EWdr@KDHKUSMpC#CzGB(X{&fdb7jv}*`>(q%-!ENe?>;rW4@;>^?s}AJHQa|R zPfjgOjn*;lLsltCUV5vpL3JgGjU}2E`>L{N_;csN(S6#wxOmICZmLgrP1BZ%`f>p9 zIG;V`{|7mMcF6z1a6Gp2KfKYG{Etua5&oau@_#R1P=0i4`L8uYG$p-T0mvUp|CZOCL&+|kYidcU8myPB(+q&%99+R$(#A~)h*#o8sNHiD`vwivYOuFi=Zfy#A zo7eX!%Wza%NI;~?3nzl>C84TR{W1o9xkmSADlhifV^*B~9af7IB=)&d#X0a82w94# zt8aUN=OmL}#cc@fe4|b&EmBwY%j|8TmPn^v$p6ek#Pc4@hZNdBX6-G|L93K)&T&@W zU;5Wl`PH(fXM$Rx2(K%i!s0M52iK7;J2l$#_8utyH+q3r*gn;(?Idqp*N^zB+n!kD z)_61r)sZAwb-&2b%u}N~hpr|vsku|S;^t3e_AeB&oTcSON%B=}G!SQbNT&ChtXSA- ze5vbYT$~zeGrL za~ZIM{||@0?f>z|U+(|-G@ly&uj}?u06_+mh^&C-4B`|*%LmM~W<&uDGeRj?r;%7h zD8h_tzk&!GY$_Q3rK&m?p)d>1CAm41TjKZKKi_wX^e>^zcNB;Y&~Y+5#7eh&08{*y z6GD;`aPJ@7Va{J<68gakF&IGxIb)Hxh#R3TmJ2}NGG4>OYB;f=Dw?Gky2oTK<75fB zTc@CN?{`2)B4E)+Qy3OR3P2sb-~SZNE+M5VLQ4P0Ia2v&Nse|r7#I|RQwq{I;3<$k zHltaOzn`O!3ylsq1nA}WT;^BwzYnmI7^;D2cPi|NW;mAMl=|BfSOrJTZc7!) ziXr4%NaTaPTCc#+s~?)$Mzz#xz+z-j5|&G)xd|(Jt9!E~W7k=%#v%{5`6WI%KK}Fl z$)E54`_K1X)yqi`cq4J-YHu+0{~L-jSBHF z7p3uvMCcn;Qs|RoEmXafWQ;R13w6QE1g36=wiT`mW^-`=ie{k&N&G~AiDinv7~`5X z@HnHy`|1jvstyVH;1eLAfY+g*9(_b4q>JQr3V&IngI{Z}xm1wy`Mk^-(o=&)NQgO$ z+70GPF^L?M!8P^;)>~&W=!jLxK{Q&BE&AXq|5NnCcWzBTdu-a4ojC}5^bSL^N@K)O zxv$@mY*K2GVlYBle|6fTkv~~en!eLM8@F^XEkKqH{&;6G!K8Ewp5TU#Le+q$pp{YN&fvxF$ zhwILPZUvg%c>}O@c(-;8=3`dd#6|yh&)`lvb+0Ylg9U8UWHf#q4uXEkYTT|qY_}b2 z-`&e;*iA^qt)xMG-k8_9JNF%Rx8w77pk=2MbSpQ192e+55M5qSYtZYL%Hs{#9-ctM zI5Q|~=?|;}mYSe)CeZ*?Lx-R}J?(nh*Dd%sy}6u&d`*1BE?q9dkJD|vqwuq1{;lZ} z;-Q|nKPqVs=jcb}V*iP5(*M}c9`=8RBHZ5i-=qGI@7eahKj?qS|N11K&&&Q7OYK8U ze*vJ@>X)E@FN0t7{^2%%0cMBUAI&a=(R%VtULURFb*#Y<|K_~=(VPPU>^1|w++c^1 zU4_=htgh*Do4LHh-WAYHl|cS53dYltHed|%4jmw$u*b8T)K+*LlW8lkJ&Y9bz5>(I zG?9bZ%#<+DZVZ241L8yaaG4E!B|UmaE@PoVXJ7QW|Flo7{OX#(kEs81k5?x$2NcJMbMtRjd|1LII+4lXqLS^w6=Lfw0T56!XCNUF zI@QI=i+jTkYVO=J77~Ap_BepNjN%>IbU^3Z*RMN8eZ;4tMsDZX=~ajS`;U&Qkm%AP z9X)i#6kKE0Yk3P6P8Ju7gycUze}}@gC?j(KKvyN`qa;N7WPSx%xP1OD z&5*oi$2_su*Jk%hcP#J^Nx3RbvJ-HT7(YugPb$^hRAprOxD1K+Ba$X-FYc~nn?4}C zSh5q~m-w_bk4u5>djbqK49YVIpdqX z13GfIe3TjNl<($7zW|-MF8VYR!uR7EJp-VTD6G?*#d>K1RlZSzT2n{4jsvD7(&K;3 z|4tZgJ|8KGEPg2NElp6u^0`3oSO#D6Mf*YxsyoXXqWv>y+#dN| z(6Hxy4^%3ac4#-vRc@H3y}R`cWeH-4_AoilUpkT17K#C`bXQxOQx(~{ zLz^S;C$VcqEwIXf+Zd?}fmCTO@m?)Es&t%ae?*CIa(<>pt;TavfvoQs`8#K~j@m_~ zOC(!^&LSo=7z?qvg#na%$R%JAtFJ3y_3~bgK>p$d1{YQ<{>yv7$hEj4CvRC4fjbex z!|F)@+G;uQ!7D}$tSN`if22x=ZW&13MBP-rV^E6LIho?gIhJKAK(ft zFlE_B9UlTAn8DKsr5Oq#L(vIXQv}MBBrk8ZG`F@@E<>F=%Rh2I z>mL^TPB)U@_t}IctR8U$5!VhN<8!E7DX=)Jrdx)oGPaLCSf+Bndw^>2`Mrhz4*9RN z^p7q7yVY$UFJWKZIc2skiFI<@a-ZQ)3XWRa#jASCG@dFva zF8x0k*!usNKmM}+Kf$ND{%^|fYq>(eSqy2dEY?d%T&PwEV54$oy%}H@qAiR8uvN}l zedQOW{YgC#NXpwn%}T)L!(5#tYnHCf%jWW^s7m|X;qVmw0y^DJxkR@7H+vaM@XKM*^HV%w{~ z*3`Y$cfHkvv4-l<-H?j)2r5_OJkE$ZZuzLY5HT-KVvK;S=`4&ng-_RvRQltH;@{=7 zP5!eqzE{__e~<>SOaC8vV_W_Q!!P>(C;2pz|J;D3vMlx*$(t(F?aYNq-aB|h;R2o1 zX#>TAlE!eM5Qv}aRRQtS-o|#d3yUFg@=BLqOJb~(7?#HRi9T`xwKe9;uRQJP^Bq}> zCeB+XMU_WN3ljeT$O_bh_C;{~7(CKfR|* z*dLBg0xGJau5n|Fy{q)ygf$4fyb%12SpTi@N3e|@9tym+L_xP}k zB#U?hGQ`p6Oeq440C-PuR2@YMusD9rNVJxBaiioOXCzsng!K;o4^HL;EE!Ab$?@C1lV zLAp-mz4>&B;uvt-PR9J;WN`#C6hnsZk+@XG_#GzE!4r@mb%*EEG(&Uz4n?xC+5bB1 z0dZ3(NyM8RC6J;F#5h5{gWmb|&)1A(=->%B6H6AnJ-Y@G&gemJf!VS6SE7H=oBcaG z7XRuWmWyNlkN!&Ulj8!=42E~>RLDMh@RuHaNDuzfo58z-zx3FO|4lNyIQYx|ckl$f zg_+2QyEuPN4|-`v{)Iwz(8Cde$Fg}w{&mp1ry+^Z@gISKs{McV{pqXkp1*kgU2hdV zdLLW&zwZtGz|Q~Z2Ve3(KF#L|I9tMGfnu`w>n!`*!NI{_p@>cRMrm8!Y0vNZgU;Xn zdJO+|@Z`x8@MG!0PfxWrvcPP)o(VmKWosnTe(5nxQ!0Y)V1|y(H-lcUSAuj1p7y5otP{qb-wS}>(+M2~s|_wA=7h_>9r+uYEkKZ(2A5K52wvY9!?Jr+pqSi zV@&o#qGm`YW?1+FSMOcu-l8Or2oi3{bS1Lgh1SPja9GRnj4DDShI{po&-O;3?Oo$Rxl73^kv z#h-53D=z(}wR&S|H>Psq58I7pL;b|xrk}XflUCXZLzH!cUSKo7;1P)S8ZID@FCf{` zISHxeEzfWkJ%btITm{N|&GBr_RX@&uXX}ON&715e3UzPZ#5=TjdWKfy9)Vku-AXf> zXrmTpi}ea6l6U!|hKqN!W%0T+w)P5Jc^*x5&1=U9yg@U1y}=fGo%&i^dTnjZq&K%j zzD1CUh9ZDdH4OXlmtq(K*D!dFVer}w z!=&er%RJjFk3(SX^JiDjPyc@L>N_AkC*URD^+I1k$$j@8W)zS$qc}o<%=vGCBI(Z; z1F@&hoezZX)enTkyJjThgVsY~*qRd3wz1%5_RT-Q4B=z}9@KG%JhO?oU8B?*zGxJC z#EgQx!U6^JjI89~WoQMlIAuCbQ!2;GYbN(R&ms3DVXm=i#Vo~}zBN__yX<%SlQ!(q zpEeUjy!{rM>-eR7(3)n?qS-fT9$M=oBw2<+#utTT590Q5n{^1fNBb#UIo+ed7P{*= zgnZDF?onl~J(KQ1g;&NTysIUa?}ac!d?E11l9zHbFh7@51oqR@$G5NEUYuW?{`~gh`r_G(=Rco6e|vHE{Q3lR?g@@M$|IE!@ZIGb zfGL2K;srO-#EAF}x0>%}*8`V`8nhNs14~2=3=!qGJZ!cDS;$zzS0a?~n*3#0h0Ej)lRoP8S)BkUVZG0sx)#I7GytwTK8T5iu}C zM2Q}Qb8DnI0h$<^q7ct%vLe(tFh|PwP7z}`Sx}(MmWh)b^($DX;LY_j5TSbfZ0GuJq8FDxkZPB_-g3wF8u;~fdGUc&|GxwV_VYt!{xZ@Rv<>H6hOR~bW@e;sf5 zf?uaVRG{m^Y>@}&Dxw=M9M8RQ`mW8=Z@pRi)@JFKH%s4Q01*l00jfwqCmDk=*J9>) zv4ZkQO58||8AxG9kx0nmYfQEg12Wn(h)oa3$alNj`mUYSZ@rWJ%7A$F17hr?o16bR z0@pX^7q7$+TwHz&SC}u1(mH6kr#$y@LjC!pe9)3?&x|aRkZiJRQSoY{cI1QBsFXES z&j{S{+dBV7lV*;a(Zubz@m$KR*IJqNEM?X!DYI>99*>*RJRWbM*`dsOt(95NQf9r9 zGP^g;HNFM$)1exJX6$z~cC%m4rQCY0m0Qn}+g?ez^` z(IHm7)?(GO#Hv>kt6n>&!D!Hs=D{|a9a7b6Emb{Bh0zAY6QO`_nqXsRblg5#SNXP(tqcI0)zr&ti0>N;T?IPjV#s4H;YC$=EpB zwIjhFv>u6)Eai~Qk!WXtjQoZI%y$Yfj-ZR?mO^{l>kloOM<&fJce&Sap1twjCpp80 zC!j<32`DGtHJ&XMf@!Zmu*P#}j%PcCVAxOz8oHGrj-ZR?mI}eN*AFb32L{b8y&l6+ zvo$mvZQ~X73IKo5n&!Smb70ausd2#QsEueQ@9X2tQ{L?+>1}qXG8{P%RXB1kdRuA( z(_Y`V=ql}Za=UBTFnnj|4&UL(yT+rXrZDaGJ!?FCb3EE<3d3eu8NB@# zn(H+M{-7<*{?ww`)D--7p8KKSOd}lnPK}Tw=%9Je^SL^jCuN%bX)VoaA#24*1Y|~d zF2XdKxDg+$v-oQ&cD+tk)0ee6$*D_2k`F#8*I;asG%-nX9!69SgvInV6!k-I3!C;` zDxKe2rSmP7&No#$&t}ss+o-Z45KtuUtU`r$yU55o6%&|Wyt@G`gE(;#1+O|mLT`!@mU*8nr*tlWZR~5DN%cBzI8-eN|bLZQSR^}i^y>^xAkD`bX!mBv$*Ah z588_M@*K1xw3&K1aAh|M3`|w2^t*vrH6claro%Wc&c@9kbwUA4Pw1M0W;sc`y=n1Sz#0Z_4F=O~z?$imgF&zbSVIGT&>wFD))2FP2{ScUCH^f| zVT4jD3X||d*z?V8nFzkABG&AoM_gHtGAb?wvR%@9J}QM* zQz<-T4nmZ%E>)MfkVFrP9ExU#&I5Oj$JB8WHf?(lHtkt%uYoxfwrL?lrj<6K4Zs*D zcgSh}xtvz*eO6_B0~24T$D+J8gGsYMyI|rBw3|B4tfp;`tfsbT>DLmdCPXoGyBs!H zAdz61L?}a%k$)$tZ>DJn+Z?e@rK2tNmPg7rsdqYO?CEV5?GU(=C#R01s%hJks);?l zUM+$8oa$ng#z@4x2xkn%t2D-Q9EuWpDsT3gtp6!VZ+PMyxKErXj=7z*o!d!yZYSlr z^($PL5|u+PY#v#k7$*yW6F^aRk3-|qGzSIslQ(HQc~+|Lq&#`m1i&2oa7`Im73YZZ z3K=dY6eYB$rmrDm8ao-2E9fYE;&zMrD1l8MoR1H%?P?EuIp=K2`Z5 zw3?v|q=d3XhUhOb$OvH|g_J&!EOOCMFUVULsjzBP3`>H1-y^sFxS6KXA3HS_S4oQ2 z6)CKO6vL7ruc;+)EiL0so>(L=2<4{pQAwv(soHG#4ReyZ-Or0p2_Lw-!|W0mIuZh2wBcg4o5@o=S~oJ68^QUl15QgE34(lz~$|E{gnSDq!F3DGgkKO+o9xroakp3e3PJ zzw7PkFYJ$+IYj#-r$aPwg*yc;!=1#NV~fa%N#vdfPW^_VnSFO?X5fl(3R=fF1y+nx zV8%F^MCuT=!khs~M3^{=^u_Mx%0`q>l1dk;kpkKuHB*cFBd6gSxT2zh)=^P`6%`ej zQBmHO8xhp~PsfEyav};xcsj%_!V5$hAED7W7|#bIIT{U5Ap7N*itU+C{h;BN3bt*j zdL27x9h((cu~~r`o3(AItt}NaTu;Ha^;ECr1|J%mO1_% zfh%?@Xc;>t-n2KKUr&tE&A33zFa6e=O3JqiQCwS9v86ahpMc7b7ujX3_XVr$rMu0=R;<0bD`PQeda%FjW23+_Jle8Rsc#SxAe9WeBcfoFEX* zz&eX5fD30xci@PK3fe|QS;6>$5fP=Rs7J%4MYdKVEgf=PJDB;F(=G!;nys@~rFiIc zPrqT}tM5*H4IG}(psgp=DyJ3nOoh>%zT+;6=Qs5D`)-fFtLRqinp;-Mt)OSBZ0@`r zOKvvwpZo4mELVlC)&;h#`dUHHRMkW_emxp4wWzgLWGO|#erUM#f%fV^8IAsaXgDQ# zTQqDrz8@Mcf!R`C_U%dW_Cdo{r>J$ABCASKzdR`eCmQvW(z^g5M1AHB*)bAIswNc|)MvZ3}H9JtLpB}HZ%I%d^ZqHD;w_{ST@_Ox5UgekY%bJT< z=)D}5i4&K4#no%8xO!#9)hiTNj>gD|M!n+dwN+fL`d40|xNb+IUY%@R{K~T@Wwaj} z^?Fe2+DukyCa=(gI2tZ%!c`xsWqG80oes*l1pDFQ;v?8 zjy8EnMCzsyyFZ;avd^Ydhj})3iQRE)u{*ZJ?${Q)?#n_-Cfc;w`Sa9u{5*Dv^Kol& zKDNa9*cRu$BR%5*XK1m8StRZO6L*6x5L5U6)P{`6u3Xr++P>mV&%)l^z?C`>$@)&_ z{=L0?rQ!wo`h*NTAP|w{YbFj1o^B931Z2$snX4=Hog~$9f^lo5W?WWk#V*G3-*G4rmsOQo%t^+_!$o18vNUe1ERD+w%GlDADeNbHC$ zH*Z{%WTG|X^X?;jsK^qp~AeP>+OcgB{!Q!{DupyEDF?8qG#zIBSxxUFI|E-OZ3 zOEGekClzlw&}iiW<1Y@%XbiUvo8mn%NeC0^LN737a)pcZ6ZutcW6q7zjD(0%RYzN0 z)E1dJ2-9Y_kxyNhk&hiZXY879KE_(E;VE%sAPaEG_uAKR4QMwhK{T=u6ma42NCaIp*fVvc7IVv+p0Wf z3^!c*Gol4%UTjEiGs+bMiX#+qBIJBD3J;mOF0vXsY@Bgh8)sa$amJR7QyolEahwZM zt_eXAR(T28GOyDjQ)@Tsn)vXvPVKL2Ye}Y@M9aS0uS2M9f9OgY0lu zrV}egf*w;>m1BivJ>_jfEaakqyH z-p4@3{;Vm3*;n2N_hl3J2l+e!7b;DH3&VqhZ`X;81B~%3gV{!CGB?>8ov8@AT@9|W zNV5Sk5e^})1Qk!^t?pd>s_%0mG!Y0WUf~#KAcc&fEI9&fiD}-)1EgTK#<39184^hy zD~J<@63Dv?31wi0*aJd|)Vm~j;jQATnG*Ue+W;6YF}mj{E(nY{j`HIA^Q-^qao!28 zq0 zxcUC#8k~K9dUXRXuEDFD9tf8xyc34NkH4&Oc-Q4ygn`8xM~D`ppy2;Kk}Zx`Fj>R+`2P`aT=O^n z-1oi{?;Lx6_cV%dvgj6T;rI~DaYkA1pbM@M66F5)1HQwq9u5z>;H*IH9Mh0wQPDb* zKlB!hWA>I_-hBVV4a@jTuTzu&2!0d-s);B|(8F=KB!r^FgKoEba2m(p3NMz7a@7)L z_b38ga8q95DoFSbA^{cuU!r)`Rjz|a7Xn-PzwZtF;n?E;LD2WU@c&Qo;XF*n8FS9k zeJhs0!GW=!F$HOcS1`lzMlj)sGhv}nZp6BOb$YGhkvVto9eht7&^^kIzyng*v$8FW zW5xd|pbRDv%p%#V?5PJX63O=So4z;%yb|`9dHI(Pjg|`*;6!i)dG?^0qF|X~Pjd={ z4}Z2PPtv(7De53Ugd`PHW22CvY+NrE_J!*ng~J_YZUtCj=# z^)~@Q+>*KhFxk{vyA&)@Ci4HdvCAK38-N*F(H?jX!)3jROqXOG=U1&!;VZgBo1TifoOjP@$#H6V*4HQtmm|)D`?~;V}cvErFpMWo2 zDeDYHV4XxLlM6^7RCL-4NhJAoX7_KpOG{X2)g#9P3IPTn;J~^HnnX&tRKgHZ3g$RQ zd?m9z5d4;8(v69eIXTM3E(1UE)ftgc30p4PNJx8zsV<}zS!Z3rxRvNqR-wYYs|M`& ziGlE8{iyWB)q(FpjHy^aKX$rZxMs`FQ70h@>incvq%n}ZH?c=>f&k1GVtdjaU$hiQ zsJM%>+g($XbtA}NH^P}1tRmf(ftbj8W^yY^@TEc4fTY)vI!KVt#|XR!GeY=e-p*l6 z5y$+w@=LChq&kJg(#DCpS}<~UabLI3L~(!(K*>GMNFun@J% zCm^2(G4NdNC;+OWRz>r9&Kj3~EbK26HMXOO9tEzMHp;459-cvE_J#q~(B zzG+dj+r`?QDF?X9FZT-s-(d!_LT{dJL@@vlMlKm;crGZ=pOiCi4rg)Y-vm!l(*I%iE+*p zLL3oU94*aIh`23*9IUI1+O<5>t)lk)9j0Qts8e4x@%$Hi1a7pY1kk%w9P?peVa<@- zhzZMi76P|8`Z=TUb_;Xu;bf5^O83}{FafHu;VZZKs;e87zFyM}SLDrJ@=}4#J9!}4 z9ZnYKI4ckGamN&{9Hwds1alMd5o%A86eTE9nMx)@V?wjKn1h5cnYATX1x!=%<`JU@k<88k=nmJ2L=NiB)e8>jg=kT{ zdY>kHFL}!_$rt?F%U8K9`K%QGJn*o4pC*SE**%Hiw>U=S71>ccpmV~d=}|`?YIjaL z$M^>EHMO@<1g@@pE66-6$be%eYDL@HXFP1hUcC^S==E&ui?%Z$@X^Jbb%3ZO_ zmeFB{6&0Izz?=8LTNvX=uXJHk>6eaxo)MB6G1sEg`5Y&hZEAMGIhx~yTW7jSND?Y8 zL}MUZ3un%cKW1qDQ*m%`m+!$ICW1pBha?G6%IGl-mnd4tI9YVjy>zP`b8~i)bW;*_ z6B420C%UgLOrkDK81Cv{6qAlqoS+M_6dkKeHrcwk3Lw379mkg>#-U{!U(8<-b}3E0 z%9x+ZF655j5J0LxSkN=`)XRXrScVxNA@g)aytch78$5%HGTeJnE2;nAbP4;z(Mf-b zqF^xbpoh>Pn2+InH1X#s8b*V8*!PD+e*|Z9KOFc7Mrbq*CbRx1nuOD^AC8BUU^_OV zcaBk=j`{i?Wf>P^!g%8?w4JF9xMEibAZtcw2xCb}KCyq*OZab`)kP72;CqtcfAe=^ zZbE@m^`e4Pn5kPAiRlJ%FBA({yTxLfxAiN=?xw-2F@W#Uab0KCH8kk;d!AlGlRoN4 z6R(ek(^-Es9S*$dXxN`Z=uOZhn4wwJ_q;&_N29?Up(&h=!m010!FTCccL>yijUa*+gl(MUm8FUGs?|b{s*p zA_+xoOE0xrnlNLH!lNJFquax$VvW_P==S#e&f(>#7T0jJK~28B&p3QoKN%7+=bQ+x zle`DFKJVkzS`;ECa}Xhlxs{och*n>|#}t#~drUc}eSufPMXvw_!Zj}8UyB4G*%~Zm za}dk+7EB`IQ{ISR%3caHhNUbq_-le=JrD+w;L3az7_V;Yfv&R!azQUf(*nMN?|^!9 z8}M}k?;(!GT58ip>HTs?T#ICAv2npIFI})s7a5EY$Y1-GWZ*pSn;vo98%Nq0;hOK2 zzJTnhk`9N$wN}DXdK<3QBwV9fK(CW?6eEVJuNR*uYtFN-d%q z_#`?HqN);_IAr{LXJb9d#&zS-3+@fFlq;_~JWker zmEC|9+<**G65k_`(3p_Bb*j%JNFq~S4EG5|Y@Mpr8zrd2q5gRt|_ROl49OpX#n^c>F~A`?(#=mPr46sA#NnN4HoPaksXW-c(xIDeS{^9%teEsXMpm(LN9uV=Ezy0<# zI4c^64@&O8&B#i91EAN_b0L1Oh=k_%NqbGp(9&{-H=HFgAr1>~^KK}Z^{xxN&0$e`(`=K!XgeQDZ)m@O_;#&t2rQ{j;*rptq_-z; z1?33vMT#KZfE0&!+B~0&#AAK_%gyy8fLAHW7)+RBXX=QIoxTMAs%ngOx)X|qZM_LA zh?B21oSunlk3ZUB{pLqa^_J;_I0WL#!;H_Li2aZ1I$1Nq1#;ceKV35t^Jm7uNbaoT zPsG()Bx6T1DoFU|#YO&nmC751srhyd0#f#Ui{GK>C61yPaqdoQOygWFAX-m{NzR|a ziodH~t?#0deIHR_&N7JR_|AO7WtiZE zDGZV3s(gZ0kl|27nVkuhnF^gbpY3AYO=uz=G)++wNysu&M08s8Li1Rh{7w1Lkaufc zKA~(7X#9%x_mrZPYisDRgb2rutVJ{yp-RVH>3&fXi9pKgNDHq0qxX~eqs%(Qmh7T; zaFxcW7n2aif{}10tA&g00#mzGs0(!)A@5F{&g(zwf}}3RvE`$HuO6>n3Xv??qFCh- zSF97l02hWj>*jCY0KexCy52q=>9{hN#L=3AT={xyi`IFe2gMCBmFLP0dKIa;d-p0@ z@7=5VQWO#2qHLLMWjvb>pwBzWnUuphbP-Jdi zT<7XbJ_OIWgqG2>uk>C2Qa9(kOBKq|xpMz1DBGPwqAm;EN|s6wDVpf;kZheCiK`W46^OjW zkw`yH7F=V(e7c$LM=UwnbByOG+=O)cLXM(WVC^<(2=mFl^z zYSde2b#92T?Aa812`17`kiHqABl1nD*zB9D7uUS$nj#}$lM`_MtY`MP^~^cHX4QS* zY=UWb+N?XNH`hw=8yqvM_jdGF>7jbI?0da&FVKg}qhLG;X1)i*;ix~G%try7ML{%& z{lTa|orI&&coNRhY>LLi;WQi#`=jA}=#56fWH=A!qaFBY15!u)Zk?SXoY*}*B|y&k zIgKCShE{O1;*Ra9DZ_3sH~Ph09acN3Opo9#OwZ2H8%Dt(@K7`k{b&%(QRGjeS>*fU z@oYRo;cPSygYn4sgIPH6qhJuhe&B@zuMY>4;cyp1#`HXp>@FY59Ts-Ed7YT30PP`d zy_cmOS6fJ?OIWE!VotD9EG#h1jX;aI3dq8-@L{OQl~lC_I#poW!?Z~e?WywwdQvDC zNd2#V=%PY$CL}UFF*av?MIx?-$Lhi)BVO#$1H}>%#v(D1J~$QPwsn*55qW5WX~%+f ztX&x6!p&rF_fj_vcDs77D}nFVccs4_8-ErCa5$RvLw`DigV`WN!*Dd7&%ChjP3OVH z3r54fk7iNekD_@Wj-%0JHs}v$({M1E1>SyG>Fr-SL)*3a&Bh<5A?_KblV?^KJ*x;6 z7q&X_*~YaRzfE1Bds4-CNh}MdbA@2^Lxvf8orKcyd0Mp0UGhZ+smuuINrOZh3`Ffv zVVX%zWb*o z<$$Qmw`X~?dXOy`xjCCcUw464Nrq=J#H%{<^I|UC{SPovHCsf1yaebMLCD`cDy&m= zw30vP+4!|L1Pzj7LXCi9=!68$V+{M+qO zek#HU_`3VGiY}lg^x2w~7lx5x=$wN`c1h@6?dUB-FcOjNHOpJGWjr^Ds^oP54x?Kb zc{ROI{BLVXO{dfEaGq8K<;0MA&ObCU8Tw_7D9b6T&5JkdTy?51*`Qo(GKYOJ z7pHA}A#`t#K(tBV3Wt)vQA`qbX`qfhF1?W7MRMp=!cTTP(}iINqP_YsePgX0fP^ATz+V?=~v7bY3A8Gb+n- zIxwupSf%%&4z8-Qa?!jJU3F4ijDDp4{QmL?r1#+wK&zB(&T)369AQUA?CDWa=9J5O zd6r#|=L)9!@WG`=JXep&T-0UI;moT%mw7AH{~YdV5+w(!D$Q0K*|xiaY1QsDq-ZgY zYRqK{oo0KxG5FZbRVJhFoQiRbfE;k5~{UJ)dwUdJ+JK>P(c9%S+D2Th$+L zF9x=a!mPFAs$wi6P-fVfVD~+tOfXeh9f9D)sBN6bKyrMKIg~kxMHVi}&⩔@Ge&h z3C*!@gZz`F!sQU$ygq*oR5YznV~EhD|6j0#6wG4YWn}m4qTH3pI>Ske{MFhX>bFZr z#3C8}RJM(hW;-{HSeGzfi+y~n>A9^(C_?vpaf5tVBtDNbaW0HplMtc%$Cw1O2Zv+p z_sJiw#niD}KJ_Z8sj8vXTM%V@GBc1ogq1dmTJGAMXbaWMn&QT|ol~-1quBh98yxMg0 zr@#GVDdwtM33t2AXQA>RU^ZD4xs7PqaH|2W268X!+3NQr8*Fq5GvU*(KSRnB#k2!Q zcftq|ujXaaOBYqq58`j4uLx&V1wvxmTcHTAYtIRE(4lI<2Vp$x4KO~09#JLMeJAeWE<{+2qbCQ*&wRpCkTzmd+7tvk}-0B*1G zzmdf8nZQMw!Soi)5foR=Ecg_N0xPO6$%d@OSq9Y+S3tOxMXsIz1Qb8PmXEcoh)z5Yk?_s7Yo&6#9u0r?o-@F>p&w1jrwNqRD z4Cg&tCx4I~uaNy*r~ZR8z#lPfJ0;QS&N3l2H9K@E%kujz3xF8FUhH3+qw-esvKt17 zYj=sW+h03#`W;uaJ14`@)Xwgu zL9|`*>h5mqx~d6)E>+j^2O~cU;A}MZ=3zMSr~M$D_UA$1h0~z#P5SfEXc!@rNm&fb>ibS6))bXySSK@>&SEaNg+R3T6mM^(6{ z3g4G0Ev{v;$1xa#^iD`;x${NHXD--{-(!4_5=3d2TZCBrC5nfy)2_rppPPvA@e z*$e$#w69yMWjH;3x?f|;3ig7fi7&m1SjBu{x)iF5nz4<(QdUE~6rI;~x3i$TOt2^s zQ3uCPNbDSUq#gjl_cu3}>P;PSq)Xh0HNc-A^M9`MDhY>1W}SYgu2*UuoZ9!Bi05;R zEYG6Dz1C+z zse2GU?FucredHxt9A8heLaej_S^N(yiorZ?b8I*Qui#^^{;52r5>8-o$AG1 z9acN3YMlMvpr{D!kA37#qA-g5XcT(W*?c}7Ov7LtqQQJH9*$;Hggig!&nMAjFbe$X zWHg7c-w%ePKCDUYun^MfW;TP)b*sHPK-IUoBC*UQHoiZ@Nu;aOa9F*tc(&VAFWa|f zH+Aq-UmpN=8@B4%R+Ij;>J8Wv`Uik5;I+txXfk!8R=5MjEAea_a&#?TbLA7{kJTAz z6_FmmNf@tnl?XT^_edS7MVcMMFw9RsGZf)%su-r*&2sVnC$z{jM9De}D`g!;g;Lr% z`Lz?K>&{7M;CbGvbJUUUxz0&v@*VE{cGOYP_(n^=+-~T-#GT(to)g`t4&|rdSXM-( zj?`|6YHljJ4A5%fs$2jRW@cVrOdlmzhB+?|#|TJCx{f8kQSI|06iP@687O<~foG~V zob<6Wkuh(S1LcwlC1JKnRf3d~tVc2~L!4HM(hVZ8<{ne5$_>F}Gb7PPcCKg9IM!De z2h4G-WT-B-Y0c{8n~QVhID7N*^!o3elYVJtE>#VNHxy;y;v78XFB}4t+;{I`26T0u zcvI@6-rpypLM}6Wk7Kkz&uIu_vCNe(?WkiG0OiZ4T1oV%lj`@Q{55?Jd_@TRHg|gK zOHqV>@D&k$MEP42Utmo|0bLhnui9OC{l6V9=e*sARqoOiZcIc!Zso30C%ZJ`D&x-w z(*}jpZ{Z5ZxTekwS5$Ed=K8tVTE)@6OmE5akS{Lp2S@zhk+YLcouYOv3RPS)7~WO1 z6r3ux%;?8xe*`W?&dK>2#_9)Ez9;{sip%2`?J0qN7^Wet0EX>BC>NY)aEt8>572uY)y*-luU-Lh1&Mt4obl<)?zr5`M zY3cJHl+B;QhXg=yb9Py(dbmKW*r}pSE#E(Hu3m_zVqY7FO52EHFk2wDYvmR-7mfCo zb45D(ORQcDz&s->sXrGrjl~n;Mz}2i-ijnceGQdzBADw-vnLfGSIBC^vtS*6-=+ev zm;_NgN$FR7h$6*sw02gcujl+vxG-F+qI_Oj&j1ZhzJm`|`)IghXz8M=7B#|l>>3S! z&y7Rf#XfQ&lslL5wlgWP2i$n-~Whl>e zX|-Z3ji4cUt2T*1woYWpQ3a`V^^Jrern$GsV2CbJhDGQENh0$u67M!Y@!Tfp^K571 zVHc+Om<#)uz^I#B_{S-Uy7&I^lf07J;ZGHuR)|u#K(2`8kBm^)--42}xb!DOio{Bs z*4&D#^*bn&B8rwDTD(X=6gS!xP}S))BPof=Vso8xqxdW@m{dhi-^S;9qs^6kdhEoI z$#K)*yHvpM7B!sofjVQg0o;wZ*3HfTlsA^T=H;W8Fhnq10u*6!TgqDA<)X90IU|wS z$hb98vfw5!yI51j-cj?wy7lG6yq4wGxVQu-5x&RK8phmIxzi=fMJY+jV1DO)erw~_ zV~-zjhQ1SbJ8n7mD1&Nu@KJPBfAV4V(ctJKe{*M_HT~4Y+w{C%-|PF{)F0&at;P@y z<`d7K1e4(eMWbLmosH&``FJ#+p!s0#&j#bctl#g?Cf;z2ys1Bf-fVz|^HF~~o$ka; zo`M{l#xc0UizTDrN?!jGfvym@H`yAU33|b0M)*V?eD&q?d41&7(Z||F+FM1B--qXU z-e@oo|9hTi|L+Y(C_-8HvaCpoz ze81_1ly-!f^G%1LckEbv&rtkLhq6tK=n^5;0mpwkIC%0z)c)-XcEP_sdGZ8YhcMwh zWgRnmaBy(&9=sypC8i~2&t=IviS*q)oL`=FcYWTA9t#<)d*tF>1PPdr>ah8}r|rw< a%je7I%jbhX|9=1g0RR7e@mjk83 + +## Helm-Chart + +##### Scan Results + +#### Chart Object: ml-workspace/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-ml-workspace' of Deployment 'RELEASE-NAME-ml-workspace' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-ml-workspace' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-ml-workspace' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-ml-workspace' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-ml-workspace' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-ml-workspace' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-ml-workspace' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-ml-workspace' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-ml-workspace' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-ml-workspace' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-ml-workspace' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-ml-workspace' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-ml-workspace' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + mltooling/ml-workspace:0.13.2@sha256:5dfc8928059eb9d6d2bc33d7947e99b6bb38c2beaa40029afb73596a9c08c134 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: mltooling/ml-workspace:0.13.2@sha256:5dfc8928059eb9d6d2bc33d7947e99b6bb38c2beaa40029afb73596a9c08c134 (ubuntu 20.04) + + +**ubuntu** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apache2-utils | CVE-2019-17567 | MEDIUM | 2.4.41-4ubuntu3.3 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| apache2-utils | CVE-2021-33193 | MEDIUM | 2.4.41-4ubuntu3.3 | 2.4.41-4ubuntu3.5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
https://portswigger.net/research/http2
https://security.netapp.com/advisory/ntap-20210917-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
| +| apache2-utils | CVE-2021-34798 | MEDIUM | 2.4.41-4ubuntu3.3 | 2.4.41-4ubuntu3.5 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-34798
https://kc.mcafee.com/corporate/index?page=content&id=SB10379
https://linux.oracle.com/cve/CVE-2021-34798.html
https://linux.oracle.com/errata/ELSA-2022-9005.html
https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
| +| apache2-utils | CVE-2021-36160 | MEDIUM | 2.4.41-4ubuntu3.3 | 2.4.41-4ubuntu3.5 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-36160
https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r73260f6ba9fb52e43d860905fc90462ba5a814afda2d011f32bbd41c@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ea0ea39e44acfbb@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r94a61a1517133a19dcf40016e87454ea86e355d06a0cec4c778530f3@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ra1c05a392587bfe34383dffe1213edc425de8d4afc25b7cefab3e781@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ra87a69d0703d09dc52b86e32b08f8d7327af10acdd5f577a4e82596a@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb2341c8786d0f9924f5b666e82d8d170b4804f50a523d750551bef1a@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpujan2022.html
| +| apache2-utils | CVE-2021-39275 | MEDIUM | 2.4.41-4ubuntu3.3 | 2.4.41-4ubuntu3.5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-39275
https://linux.oracle.com/cve/CVE-2021-39275.html
https://linux.oracle.com/errata/ELSA-2022-9005.html
https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpujan2022.html
| +| apache2-utils | CVE-2021-40438 | MEDIUM | 2.4.41-4ubuntu3.3 | 2.4.41-4ubuntu3.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-40438
https://linux.oracle.com/cve/CVE-2021-40438.html
https://linux.oracle.com/errata/ELSA-2021-3856.html
https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://ubuntu.com/security/notices/USN-5090-2 (regression update esm)
https://ubuntu.com/security/notices/USN-5090-3 (regression update)
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
| +| apache2-utils | CVE-2021-44224 | MEDIUM | 2.4.41-4ubuntu3.3 | 2.4.41-4ubuntu3.9 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/12/20/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
https://httpd.apache.org/security/vulnerabilities_24.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20211224-0001/
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
| +| apache2-utils | CVE-2021-44790 | MEDIUM | 2.4.41-4ubuntu3.3 | 2.4.41-4ubuntu3.9 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/12/20/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2021-44790.html
https://linux.oracle.com/errata/ELSA-2022-0258.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20211224-0001/
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
| +| apache2-utils | CVE-2022-22719 | MEDIUM | 2.4.41-4ubuntu3.3 | 2.4.41-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-utils | CVE-2022-22720 | MEDIUM | 2.4.41-4ubuntu3.3 | 2.4.41-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
https://linux.oracle.com/cve/CVE-2022-22720.html
https://linux.oracle.com/errata/ELSA-2022-1049.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-utils | CVE-2022-23943 | MEDIUM | 2.4.41-4ubuntu3.3 | 2.4.41-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-utils | CVE-2022-22721 | LOW | 2.4.41-4ubuntu3.3 | 2.4.41-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| bash | CVE-2019-18276 | LOW | 5.0-6ubuntu1.1 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| binutils | CVE-2017-13716 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils | CVE-2018-20657 | LOW | 2.34-6ubuntu1.1 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| binutils | CVE-2019-1010204 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils | CVE-2020-16592 | LOW | 2.34-6ubuntu1.1 | 2.34-6ubuntu1.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils | CVE-2021-3487 | LOW | 2.34-6ubuntu1.1 | 2.34-6ubuntu1.3 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils | CVE-2021-45078 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils-common | CVE-2017-13716 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils-common | CVE-2018-20657 | LOW | 2.34-6ubuntu1.1 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| binutils-common | CVE-2019-1010204 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils-common | CVE-2020-16592 | LOW | 2.34-6ubuntu1.1 | 2.34-6ubuntu1.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-common | CVE-2021-3487 | LOW | 2.34-6ubuntu1.1 | 2.34-6ubuntu1.3 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils-common | CVE-2021-45078 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils-x86-64-linux-gnu | CVE-2017-13716 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils-x86-64-linux-gnu | CVE-2018-20657 | LOW | 2.34-6ubuntu1.1 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| binutils-x86-64-linux-gnu | CVE-2019-1010204 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils-x86-64-linux-gnu | CVE-2020-16592 | LOW | 2.34-6ubuntu1.1 | 2.34-6ubuntu1.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-x86-64-linux-gnu | CVE-2021-3487 | LOW | 2.34-6ubuntu1.1 | 2.34-6ubuntu1.3 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils-x86-64-linux-gnu | CVE-2021-45078 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
| +| bsdutils | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| bsdutils | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| cpp | CVE-2020-13844 | MEDIUM | 1.185.1ubuntu2 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| cpp-8 | CVE-2020-13844 | MEDIUM | 8.4.0-3ubuntu2 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| cpp-9 | CVE-2020-13844 | MEDIUM | 9.3.0-17ubuntu1~20.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| curl | CVE-2021-22924 | MEDIUM | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.6 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22925 | MEDIUM | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.6 |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | MEDIUM | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.7 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.7 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.6 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| dbus | CVE-2020-35512 | LOW | 1.12.16-2ubuntu2.1 | |
Expand...https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
https://ubuntu.com/security/notices/USN-5244-1
| +| dbus-user-session | CVE-2020-35512 | LOW | 1.12.16-2ubuntu2.1 | |
Expand...https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
https://ubuntu.com/security/notices/USN-5244-1
| +| dbus-x11 | CVE-2020-35512 | LOW | 1.12.16-2ubuntu2.1 | |
Expand...https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
https://ubuntu.com/security/notices/USN-5244-1
| +| fdisk | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| fdisk | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| g++ | CVE-2020-13844 | MEDIUM | 1.185.1ubuntu2 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| g++-9 | CVE-2020-13844 | MEDIUM | 9.3.0-17ubuntu1~20.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| gcc | CVE-2020-13844 | MEDIUM | 1.185.1ubuntu2 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| gcc-8 | CVE-2020-13844 | MEDIUM | 8.4.0-3ubuntu2 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| gcc-8-base | CVE-2020-13844 | MEDIUM | 8.4.0-3ubuntu2 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| gcc-9 | CVE-2020-13844 | MEDIUM | 9.3.0-17ubuntu1~20.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| gcc-9-base | CVE-2020-13844 | MEDIUM | 9.3.0-17ubuntu1~20.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| gfortran-8 | CVE-2020-13844 | MEDIUM | 8.4.0-3ubuntu2 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| gir1.2-gdkpixbuf-2.0 | CVE-2021-44648 | MEDIUM | 2.40.0+dfsg-3ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/
https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
| +| git | CVE-2018-1000021 | LOW | 1:2.32.0-1~ppa0~ubuntu20.04.1 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| +| git-lfs | CVE-2021-21237 | MEDIUM | 2.9.2-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21237
https://github.com/advisories/GHSA-cx3w-xqmc-84g5
https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a
https://github.com/git-lfs/git-lfs/releases/tag/v2.13.2
https://github.com/git-lfs/git-lfs/security/advisories/GHSA-cx3w-xqmc-84g5
https://nvd.nist.gov/vuln/detail/CVE-2021-21237
| +| git-man | CVE-2018-1000021 | LOW | 1:2.32.0-1~ppa0~ubuntu20.04.1 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| +| hdf5-helpers | CVE-2017-17507 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507
https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md
https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md
| +| hdf5-helpers | CVE-2018-17233 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero
| +| hdf5-helpers | CVE-2018-17234 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak
| +| hdf5-helpers | CVE-2018-17432 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode
| +| hdf5-helpers | CVE-2018-17433 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc
| +| hdf5-helpers | CVE-2018-17434 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters
| +| hdf5-helpers | CVE-2018-17437 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper
| +| hdf5-helpers | CVE-2018-17438 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect
| +| hdf5-helpers | CVE-2019-8397 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397
https://github.com/magicSwordsMan/PAAFS/tree/master/vul5
| +| hdf5-helpers | CVE-2019-9151 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151
https://github.com/magicSwordsMan/PAAFS/tree/master/vul7
| +| hdf5-helpers | CVE-2019-9152 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152
https://github.com/magicSwordsMan/PAAFS/tree/master/vul8
| +| krb5-multidev | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| krb5-multidev | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libapparmor1 | CVE-2016-1585 | MEDIUM | 2.13.3-7ubuntu5.1 | |
Expand...https://bugs.launchpad.net/apparmor/+bug/1597017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libarchive-dev | CVE-2021-36976 | MEDIUM | 3.4.0-2ubuntu1 | 3.4.0-2ubuntu1.1 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/27
http://seclists.org/fulldisclosure/2022/Mar/28
http://seclists.org/fulldisclosure/2022/Mar/29
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/
https://support.apple.com/kb/HT213182
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213193
https://ubuntu.com/security/notices/USN-5291-1
| +| libarchive-dev | CVE-2021-23177 | LOW | 3.4.0-2ubuntu1 | 3.4.0-2ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177
https://linux.oracle.com/cve/CVE-2021-23177.html
https://linux.oracle.com/errata/ELSA-2022-0892.html
https://ubuntu.com/security/notices/USN-5291-1
| +| libarchive-dev | CVE-2021-31566 | LOW | 3.4.0-2ubuntu1 | 3.4.0-2ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566
https://linux.oracle.com/cve/CVE-2021-31566.html
https://linux.oracle.com/errata/ELSA-2022-0892.html
https://ubuntu.com/security/notices/USN-5291-1
| +| libarchive-tools | CVE-2021-36976 | MEDIUM | 3.4.0-2ubuntu1 | 3.4.0-2ubuntu1.1 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/27
http://seclists.org/fulldisclosure/2022/Mar/28
http://seclists.org/fulldisclosure/2022/Mar/29
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/
https://support.apple.com/kb/HT213182
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213193
https://ubuntu.com/security/notices/USN-5291-1
| +| libarchive-tools | CVE-2021-23177 | LOW | 3.4.0-2ubuntu1 | 3.4.0-2ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177
https://linux.oracle.com/cve/CVE-2021-23177.html
https://linux.oracle.com/errata/ELSA-2022-0892.html
https://ubuntu.com/security/notices/USN-5291-1
| +| libarchive-tools | CVE-2021-31566 | LOW | 3.4.0-2ubuntu1 | 3.4.0-2ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566
https://linux.oracle.com/cve/CVE-2021-31566.html
https://linux.oracle.com/errata/ELSA-2022-0892.html
https://ubuntu.com/security/notices/USN-5291-1
| +| libarchive13 | CVE-2021-36976 | MEDIUM | 3.4.0-2ubuntu1 | 3.4.0-2ubuntu1.1 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/27
http://seclists.org/fulldisclosure/2022/Mar/28
http://seclists.org/fulldisclosure/2022/Mar/29
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/
https://support.apple.com/kb/HT213182
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213193
https://ubuntu.com/security/notices/USN-5291-1
| +| libarchive13 | CVE-2021-23177 | LOW | 3.4.0-2ubuntu1 | 3.4.0-2ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177
https://linux.oracle.com/cve/CVE-2021-23177.html
https://linux.oracle.com/errata/ELSA-2022-0892.html
https://ubuntu.com/security/notices/USN-5291-1
| +| libarchive13 | CVE-2021-31566 | LOW | 3.4.0-2ubuntu1 | 3.4.0-2ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566
https://linux.oracle.com/cve/CVE-2021-31566.html
https://linux.oracle.com/errata/ELSA-2022-0892.html
https://ubuntu.com/security/notices/USN-5291-1
| +| libasan5 | CVE-2020-13844 | MEDIUM | 9.3.0-17ubuntu1~20.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libbinutils | CVE-2017-13716 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libbinutils | CVE-2018-20657 | LOW | 2.34-6ubuntu1.1 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| libbinutils | CVE-2019-1010204 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libbinutils | CVE-2020-16592 | LOW | 2.34-6ubuntu1.1 | 2.34-6ubuntu1.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| libbinutils | CVE-2021-3487 | LOW | 2.34-6ubuntu1.1 | 2.34-6ubuntu1.3 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
https://ubuntu.com/security/notices/USN-5341-1
| +| libbinutils | CVE-2021-45078 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
| +| libblas-dev | CVE-2021-4048 | LOW | 3.9.0-1build1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048
https://github.com/JuliaLang/julia/issues/42415
https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781
https://github.com/Reference-LAPACK/lapack/pull/625
https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c
https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41
https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7
https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/
| +| libblas3 | CVE-2021-4048 | LOW | 3.9.0-1build1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048
https://github.com/JuliaLang/julia/issues/42415
https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781
https://github.com/Reference-LAPACK/lapack/pull/625
https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c
https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41
https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7
https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/
| +| libblkid1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libblkid1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libc-bin | CVE-2021-3999 | MEDIUM | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2019-25013 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2020-27618 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2020-29562 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2020-6096 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2021-3326 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-35942 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-dev-bin | CVE-2021-3999 | MEDIUM | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-dev-bin | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-dev-bin | CVE-2019-25013 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-dev-bin | CVE-2020-27618 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-dev-bin | CVE-2020-29562 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-dev-bin | CVE-2020-6096 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-dev-bin | CVE-2021-27645 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-dev-bin | CVE-2021-3326 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-dev-bin | CVE-2021-35942 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-dev-bin | CVE-2022-23218 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-dev-bin | CVE-2022-23219 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2021-3999 | MEDIUM | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2019-25013 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2020-27618 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2020-29562 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2020-6096 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-3326 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-35942 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6-dev | CVE-2021-3999 | MEDIUM | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6-dev | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6-dev | CVE-2019-25013 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6-dev | CVE-2020-27618 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6-dev | CVE-2020-29562 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6-dev | CVE-2020-6096 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6-dev | CVE-2021-27645 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6-dev | CVE-2021-3326 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6-dev | CVE-2021-35942 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6-dev | CVE-2022-23218 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6-dev | CVE-2022-23219 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libcairo-gobject2 | CVE-2017-7475 | LOW | 1.16.0-4ubuntu1 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| +| libcairo-gobject2 | CVE-2017-9814 | LOW | 1.16.0-4ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html
https://bugs.freedesktop.org/show_bug.cgi?id=101547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/201904-01
| +| libcairo-gobject2 | CVE-2018-18064 | LOW | 1.16.0-4ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo-gobject2 | CVE-2019-6461 | LOW | 1.16.0-4ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo-gobject2 | CVE-2019-6462 | LOW | 1.16.0-4ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2017-7475 | LOW | 1.16.0-4ubuntu1 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| +| libcairo2 | CVE-2017-9814 | LOW | 1.16.0-4ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html
https://bugs.freedesktop.org/show_bug.cgi?id=101547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/201904-01
| +| libcairo2 | CVE-2018-18064 | LOW | 1.16.0-4ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2019-6461 | LOW | 1.16.0-4ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2019-6462 | LOW | 1.16.0-4ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcryptsetup12 | CVE-2021-4122 | MEDIUM | 2:2.2.2-3ubuntu2.3 | 2:2.2.2-3ubuntu2.4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4122
https://linux.oracle.com/cve/CVE-2021-4122.html
https://linux.oracle.com/errata/ELSA-2022-0370.html
https://mirrors.edge.kernel.org/pub/linux/utils/cryptsetup/v2.4/v2.4.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5286-1
https://www.openwall.com/lists/oss-security/2022/01/13/2
| +| libctf-nobfd0 | CVE-2017-13716 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libctf-nobfd0 | CVE-2018-20657 | LOW | 2.34-6ubuntu1.1 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| libctf-nobfd0 | CVE-2019-1010204 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libctf-nobfd0 | CVE-2020-16592 | LOW | 2.34-6ubuntu1.1 | 2.34-6ubuntu1.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| libctf-nobfd0 | CVE-2021-3487 | LOW | 2.34-6ubuntu1.1 | 2.34-6ubuntu1.3 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
https://ubuntu.com/security/notices/USN-5341-1
| +| libctf-nobfd0 | CVE-2021-45078 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
| +| libctf0 | CVE-2017-13716 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libctf0 | CVE-2018-20657 | LOW | 2.34-6ubuntu1.1 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| +| libctf0 | CVE-2019-1010204 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libctf0 | CVE-2020-16592 | LOW | 2.34-6ubuntu1.1 | 2.34-6ubuntu1.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| libctf0 | CVE-2021-3487 | LOW | 2.34-6ubuntu1.1 | 2.34-6ubuntu1.3 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
https://ubuntu.com/security/notices/USN-5341-1
| +| libctf0 | CVE-2021-45078 | LOW | 2.34-6ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
| +| libcups2 | CVE-2019-8842 | LOW | 2.3.1-9ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT210788
| +| libcups2 | CVE-2020-10001 | LOW | 2.3.1-9ubuntu1.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001
https://linux.oracle.com/cve/CVE-2020-10001.html
https://linux.oracle.com/errata/ELSA-2021-4393.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html
https://support.apple.com/en-us/HT212011
| +| libcurl3-gnutls | CVE-2021-22924 | MEDIUM | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.6 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22925 | MEDIUM | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.6 |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22946 | MEDIUM | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.7 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22947 | MEDIUM | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.7 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22898 | LOW | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.6 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22924 | MEDIUM | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.6 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22925 | MEDIUM | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.6 |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22946 | MEDIUM | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.7 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.7 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.68.0-1ubuntu2.5 | 7.68.0-1ubuntu2.6 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libdbus-1-3 | CVE-2020-35512 | LOW | 1.12.16-2ubuntu2.1 | |
Expand...https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
https://ubuntu.com/security/notices/USN-5244-1
| +| libexempi8 | CVE-2018-12648 | LOW | 2.5.1-1build1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00070.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00075.html
https://bugs.freedesktop.org/show_bug.cgi?id=106981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12648
| +| libexiv2-27 | CVE-2021-32815 | MEDIUM | 0.27.2-8ubuntu2.4 | 0.27.2-8ubuntu2.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32815
https://github.com/Exiv2/exiv2/pull/1739
https://github.com/Exiv2/exiv2/security/advisories/GHSA-mv9g-fxh2-m49m
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/
https://ubuntu.com/security/notices/USN-5043-1
| +| libexiv2-27 | CVE-2021-34334 | MEDIUM | 0.27.2-8ubuntu2.4 | 0.27.2-8ubuntu2.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34334
https://github.com/Exiv2/exiv2/pull/1766
https://github.com/Exiv2/exiv2/security/advisories/GHSA-hqjh-hpv8-8r9p
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/
https://ubuntu.com/security/notices/USN-5043-1
| +| libexiv2-27 | CVE-2021-34335 | MEDIUM | 0.27.2-8ubuntu2.4 | 0.27.2-8ubuntu2.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34335
https://github.com/Exiv2/exiv2/pull/1750
https://github.com/Exiv2/exiv2/security/advisories/GHSA-pvjp-m4f6-q984
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/
https://ubuntu.com/security/notices/USN-5043-1
| +| libexiv2-27 | CVE-2021-37615 | MEDIUM | 0.27.2-8ubuntu2.4 | 0.27.2-8ubuntu2.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37615
https://github.com/Exiv2/exiv2/pull/1758
https://github.com/Exiv2/exiv2/security/advisories/GHSA-h9x9-4f77-336w
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/
https://ubuntu.com/security/notices/USN-5043-1
| +| libexiv2-27 | CVE-2021-37616 | MEDIUM | 0.27.2-8ubuntu2.4 | 0.27.2-8ubuntu2.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37616
https://github.com/Exiv2/exiv2/pull/1758
https://github.com/Exiv2/exiv2/security/advisories/GHSA-54f7-vvj7-545w
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/
https://ubuntu.com/security/notices/USN-5043-1
| +| libexiv2-27 | CVE-2021-37618 | MEDIUM | 0.27.2-8ubuntu2.4 | 0.27.2-8ubuntu2.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37618
https://github.com/Exiv2/exiv2/pull/1759
https://github.com/Exiv2/exiv2/security/advisories/GHSA-583f-w9pm-99r2
https://linux.oracle.com/cve/CVE-2021-37618.html
https://linux.oracle.com/errata/ELSA-2021-4319.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/
https://ubuntu.com/security/notices/USN-5043-1
| +| libexiv2-27 | CVE-2021-37619 | MEDIUM | 0.27.2-8ubuntu2.4 | 0.27.2-8ubuntu2.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37619
https://github.com/Exiv2/exiv2/pull/1752
https://github.com/Exiv2/exiv2/security/advisories/GHSA-mxw9-qx4c-6m8v
https://linux.oracle.com/cve/CVE-2021-37619.html
https://linux.oracle.com/errata/ELSA-2021-4319.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/
https://ubuntu.com/security/notices/USN-5043-1
| +| libexiv2-27 | CVE-2021-37620 | MEDIUM | 0.27.2-8ubuntu2.4 | 0.27.2-8ubuntu2.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37620
https://github.com/Exiv2/exiv2/pull/1769
https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/
https://ubuntu.com/security/notices/USN-5043-1
https://ubuntu.com/security/notices/USN-5043-2
| +| libexiv2-27 | CVE-2021-37621 | MEDIUM | 0.27.2-8ubuntu2.4 | 0.27.2-8ubuntu2.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37621
https://github.com/Exiv2/exiv2/pull/1778
https://github.com/Exiv2/exiv2/security/advisories/GHSA-m479-7frc-gqqg
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/
https://ubuntu.com/security/notices/USN-5043-1
| +| libexiv2-27 | CVE-2021-37622 | MEDIUM | 0.27.2-8ubuntu2.4 | 0.27.2-8ubuntu2.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37622
https://github.com/Exiv2/exiv2/pull/1788
https://github.com/Exiv2/exiv2/security/advisories/GHSA-9jh3-fcc3-g6hv
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/
https://ubuntu.com/security/notices/USN-5043-1
| +| libexiv2-27 | CVE-2021-37623 | MEDIUM | 0.27.2-8ubuntu2.4 | 0.27.2-8ubuntu2.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37623
https://github.com/Exiv2/exiv2/pull/1790
https://github.com/Exiv2/exiv2/security/advisories/GHSA-mvc4-g5pv-4qqq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/
https://ubuntu.com/security/notices/USN-5043-1
| +| libexpat1 | CVE-2022-25235 | HIGH | 2.2.9-1build1 | 2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
https://github.com/libexpat/libexpat/pull/562
https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)
https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)
https://linux.oracle.com/cve/CVE-2022-25235.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1 | CVE-2022-25236 | HIGH | 2.2.9-1build1 | 2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
https://github.com/libexpat/libexpat/pull/561
https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)
https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)
https://github.com/libexpat/libexpat/pull/577
https://linux.oracle.com/cve/CVE-2022-25236.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1 | CVE-2021-46143 | MEDIUM | 2.2.9-1build1 | 2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://linux.oracle.com/cve/CVE-2021-46143.html
https://linux.oracle.com/errata/ELSA-2022-9227.html
https://security.netapp.com/advisory/ntap-20220121-0006/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22822 | MEDIUM | 2.2.9-1build1 | 2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22822.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22823 | MEDIUM | 2.2.9-1build1 | 2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22823.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22824 | MEDIUM | 2.2.9-1build1 | 2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22824.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22825 | MEDIUM | 2.2.9-1build1 | 2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22825.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22826 | MEDIUM | 2.2.9-1build1 | 2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22826.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22827 | MEDIUM | 2.2.9-1build1 | 2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22827.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-23852 | MEDIUM | 2.2.9-1build1 | 2.2.9-1ubuntu0.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://linux.oracle.com/cve/CVE-2022-23852.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://security.netapp.com/advisory/ntap-20220217-0001/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-23990 | MEDIUM | 2.2.9-1build1 | 2.2.9-1ubuntu0.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://linux.oracle.com/cve/CVE-2022-23990.html
https://linux.oracle.com/errata/ELSA-2022-9232.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-25313 | MEDIUM | 2.2.9-1build1 | 2.2.9-1ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
https://github.com/libexpat/libexpat/pull/558
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1 | CVE-2022-25314 | MEDIUM | 2.2.9-1build1 | 2.2.9-1ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
https://github.com/libexpat/libexpat/pull/560
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1 | CVE-2022-25315 | MEDIUM | 2.2.9-1build1 | 2.2.9-1ubuntu0.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
https://github.com/libexpat/libexpat/pull/559
https://linux.oracle.com/cve/CVE-2022-25315.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1 | CVE-2021-45960 | LOW | 2.2.9-1build1 | 2.2.9-1ubuntu0.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea
https://linux.oracle.com/cve/CVE-2021-45960.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://security.netapp.com/advisory/ntap-20220121-0004/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libfdisk1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libfdisk1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libflac8 | CVE-2020-0499 | LOW | 1.3.3-1build1 | |
Expand...https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/
https://source.android.com/security/bulletin/pixel/2020-12-01
| +| libgcc-8-dev | CVE-2020-13844 | MEDIUM | 8.4.0-3ubuntu2 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| libgcc-9-dev | CVE-2020-13844 | MEDIUM | 9.3.0-17ubuntu1~20.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| libgcrypt20 | CVE-2021-40528 | MEDIUM | 1.8.5-5ubuntu1 | 1.8.5-5ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528
https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13
https://eprint.iacr.org/2021/923
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320
https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
| +| libgcrypt20 | CVE-2021-33560 | LOW | 1.8.5-5ubuntu1 | 1.8.5-5ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgd3 | CVE-2021-40145 | MEDIUM | 2.2.5-5.2ubuntu2 | 2.2.5-5.2ubuntu2.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145
https://github.com/libgd/libgd/commit/c5fd25ce0e48fd5618a972ca9f5e28d6d62006af
https://github.com/libgd/libgd/issues/700
https://github.com/libgd/libgd/pull/713
https://ubuntu.com/security/notices/USN-5068-1
| +| libgd3 | CVE-2017-6363 | LOW | 2.2.5-5.2ubuntu2 | 2.2.5-5.2ubuntu2.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363
https://github.com/libgd/libgd/commit/0be86e1926939a98afbd2f3a23c673dfc4df2a7c
https://github.com/libgd/libgd/commit/2dbd8f6e66b73ed43d9b81a45350922b80f75397
https://github.com/libgd/libgd/issues/383
https://ubuntu.com/security/notices/USN-5068-1
| +| libgd3 | CVE-2021-38115 | LOW | 2.2.5-5.2ubuntu2 | 2.2.5-5.2ubuntu2.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115
https://github.com/libgd/libgd/commit/8b111b2b4a4842179be66db68d84dda91a246032
https://github.com/libgd/libgd/issues/697
https://github.com/libgd/libgd/pull/711/commits/8b111b2b4a4842179be66db68d84dda91a246032
https://ubuntu.com/security/notices/USN-5068-1
| +| libgd3 | CVE-2021-40812 | LOW | 2.2.5-5.2ubuntu2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812
https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9
https://github.com/libgd/libgd/issues/750#issuecomment-914872385
https://github.com/libgd/libgd/issues/757
| +| libgdk-pixbuf2.0-0 | CVE-2021-44648 | MEDIUM | 2.40.0+dfsg-3ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/
https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
| +| libgdk-pixbuf2.0-common | CVE-2021-44648 | MEDIUM | 2.40.0+dfsg-3ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/
https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
| +| libgfortran-8-dev | CVE-2020-13844 | MEDIUM | 8.4.0-3ubuntu2 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| libgif7 | CVE-2020-23922 | LOW | 5.1.9-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23922
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceforge.net/p/giflib/bugs/151/
| +| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2021-20231 | LOW | 3.6.13-2ubuntu1.3 | 3.6.13-2ubuntu1.6 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1922276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
https://linux.oracle.com/cve/CVE-2021-20231.html
https://linux.oracle.com/errata/ELSA-2022-9221.html
https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
https://security.netapp.com/advisory/ntap-20210416-0005/
https://ubuntu.com/security/notices/USN-5029-1
https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
| +| libgnutls30 | CVE-2021-20232 | LOW | 3.6.13-2ubuntu1.3 | 3.6.13-2ubuntu1.6 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1922275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
https://linux.oracle.com/cve/CVE-2021-20232.html
https://linux.oracle.com/errata/ELSA-2022-9221.html
https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
https://security.netapp.com/advisory/ntap-20210416-0005/
https://ubuntu.com/security/notices/USN-5029-1
https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
| +| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libgssrpc4 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgssrpc4 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libgxps2 | CVE-2018-10767 | LOW | 0.3.1-1 | |
Expand...https://access.redhat.com/errata/RHBA-2019:0327
https://access.redhat.com/errata/RHSA-2018:3140
https://access.redhat.com/errata/RHSA-2018:3505
https://bugzilla.redhat.com/show_bug.cgi?id=1575188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10767
https://linux.oracle.com/cve/CVE-2018-10767.html
https://linux.oracle.com/errata/ELSA-2018-3140.html
| +| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhdf5-103 | CVE-2017-17507 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507
https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md
https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md
| +| libhdf5-103 | CVE-2018-17233 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero
| +| libhdf5-103 | CVE-2018-17234 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak
| +| libhdf5-103 | CVE-2018-17432 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode
| +| libhdf5-103 | CVE-2018-17433 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc
| +| libhdf5-103 | CVE-2018-17434 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters
| +| libhdf5-103 | CVE-2018-17437 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper
| +| libhdf5-103 | CVE-2018-17438 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect
| +| libhdf5-103 | CVE-2019-8397 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397
https://github.com/magicSwordsMan/PAAFS/tree/master/vul5
| +| libhdf5-103 | CVE-2019-9151 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151
https://github.com/magicSwordsMan/PAAFS/tree/master/vul7
| +| libhdf5-103 | CVE-2019-9152 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152
https://github.com/magicSwordsMan/PAAFS/tree/master/vul8
| +| libhdf5-cpp-103 | CVE-2017-17507 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507
https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md
https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md
| +| libhdf5-cpp-103 | CVE-2018-17233 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero
| +| libhdf5-cpp-103 | CVE-2018-17234 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak
| +| libhdf5-cpp-103 | CVE-2018-17432 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode
| +| libhdf5-cpp-103 | CVE-2018-17433 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc
| +| libhdf5-cpp-103 | CVE-2018-17434 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters
| +| libhdf5-cpp-103 | CVE-2018-17437 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper
| +| libhdf5-cpp-103 | CVE-2018-17438 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect
| +| libhdf5-cpp-103 | CVE-2019-8397 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397
https://github.com/magicSwordsMan/PAAFS/tree/master/vul5
| +| libhdf5-cpp-103 | CVE-2019-9151 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151
https://github.com/magicSwordsMan/PAAFS/tree/master/vul7
| +| libhdf5-cpp-103 | CVE-2019-9152 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152
https://github.com/magicSwordsMan/PAAFS/tree/master/vul8
| +| libhdf5-dev | CVE-2017-17507 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17507
https://github.com/xiaoqx/pocs/blob/master/hdf5/readme.md
https://github.com/xiaoqx/pocs/tree/master/hdf5/readme.md
| +| libhdf5-dev | CVE-2018-17233 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17233
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln2#divided-by-zero---h5d__create_chunk_file_map_hyper_div_zero
| +| libhdf5-dev | CVE-2018-17234 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17234
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln3#memory-leak---h5o__chunk_deserialize_memory_leak
| +| libhdf5-dev | CVE-2018-17432 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17432
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln6#null-pointer-dereference-in-h5o_sdspace_encode
| +| libhdf5-dev | CVE-2018-17433 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17433
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc
| +| libhdf5-dev | CVE-2018-17434 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17434
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters
| +| libhdf5-dev | CVE-2018-17437 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17437
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln5#memory-leak-in-h5o_dtype_decode_helper
| +| libhdf5-dev | CVE-2018-17438 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17438
https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_h5d__select_io_h5dselect
| +| libhdf5-dev | CVE-2019-8397 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8397
https://github.com/magicSwordsMan/PAAFS/tree/master/vul5
| +| libhdf5-dev | CVE-2019-9151 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9151
https://github.com/magicSwordsMan/PAAFS/tree/master/vul7
| +| libhdf5-dev | CVE-2019-9152 | MEDIUM | 1.10.4+repack-11ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9152
https://github.com/magicSwordsMan/PAAFS/tree/master/vul8
| +| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libicu66 | CVE-2021-30535 | MEDIUM | 66.1-2ubuntu2 | 66.1-2ubuntu2.1 |
Expand...https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html
https://crbug.com/1194899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535
https://github.com/unicode-org/icu/pull/1698
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/
https://ubuntu.com/security/notices/USN-5156-1
| +| libjbig-dev | CVE-2017-9937 | LOW | 2.1-3.1build1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1build1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libjpeg-turbo8 | CVE-2020-17541 | LOW | 2.0.3-0ubuntu1.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
https://linux.oracle.com/cve/CVE-2020-17541.html
https://linux.oracle.com/errata/ELSA-2021-4288.html
| +| libjpeg-turbo8-dev | CVE-2020-17541 | LOW | 2.0.3-0ubuntu1.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
https://linux.oracle.com/cve/CVE-2020-17541.html
https://linux.oracle.com/errata/ELSA-2021-4288.html
| +| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkadm5clnt-mit11 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkadm5clnt-mit11 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkadm5srv-mit11 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkadm5srv-mit11 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkdb5-9 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkdb5-9 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-dev | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5-dev | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| liblapack-dev | CVE-2021-4048 | LOW | 3.9.0-1build1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048
https://github.com/JuliaLang/julia/issues/42415
https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781
https://github.com/Reference-LAPACK/lapack/pull/625
https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c
https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41
https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7
https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/
| +| liblapack3 | CVE-2021-4048 | LOW | 3.9.0-1build1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048
https://github.com/JuliaLang/julia/issues/42415
https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781
https://github.com/Reference-LAPACK/lapack/pull/625
https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c
https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41
https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7
https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/
| +| liblept5 | CVE-2020-36278 | MEDIUM | 1.79.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36278
https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842
https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0
https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/
https://security.gentoo.org/glsa/202107-53
| +| liblept5 | CVE-2020-36279 | MEDIUM | 1.79.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36279
https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4
https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0
https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/
https://security.gentoo.org/glsa/202107-53
| +| liblept5 | CVE-2020-36280 | MEDIUM | 1.79.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36280
https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c
https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/
https://security.gentoo.org/glsa/202107-53
| +| liblept5 | CVE-2020-36281 | MEDIUM | 1.79.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36281
https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5
https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0
https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/
https://security.gentoo.org/glsa/202107-53
| +| libleptonica-dev | CVE-2020-36278 | MEDIUM | 1.79.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36278
https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842
https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0
https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/
https://security.gentoo.org/glsa/202107-53
| +| libleptonica-dev | CVE-2020-36279 | MEDIUM | 1.79.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36279
https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4
https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0
https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/
https://security.gentoo.org/glsa/202107-53
| +| libleptonica-dev | CVE-2020-36280 | MEDIUM | 1.79.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36280
https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c
https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/
https://security.gentoo.org/glsa/202107-53
| +| libleptonica-dev | CVE-2020-36281 | MEDIUM | 1.79.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36281
https://github.com/DanBloomberg/leptonica/commit/5ee24b398bb67666f6d173763eaaedd9c36fb1e5
https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0
https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW/
https://security.gentoo.org/glsa/202107-53
| +| libmount1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libmount1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libmpx2 | CVE-2020-13844 | MEDIUM | 8.4.0-3ubuntu2 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| libmysqlclient-dev | CVE-2021-2339 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2339
https://linux.oracle.com/cve/CVE-2021-2339.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2340 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2340
https://linux.oracle.com/cve/CVE-2021-2340.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2342 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2342
https://linux.oracle.com/cve/CVE-2021-2342.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2352 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2352
https://linux.oracle.com/cve/CVE-2021-2352.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2354 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2354
https://linux.oracle.com/cve/CVE-2021-2354.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2356 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2356
https://linux.oracle.com/cve/CVE-2021-2356.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2357 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2357
https://linux.oracle.com/cve/CVE-2021-2357.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2367 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2367
https://linux.oracle.com/cve/CVE-2021-2367.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2370 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2370
https://linux.oracle.com/cve/CVE-2021-2370.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2372 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372
https://linux.oracle.com/cve/CVE-2021-2372.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-2
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2374 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2374
https://linux.oracle.com/cve/CVE-2021-2374.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2383 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2383
https://linux.oracle.com/cve/CVE-2021-2383.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2384 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2384
https://linux.oracle.com/cve/CVE-2021-2384.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2385 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2385
https://linux.oracle.com/cve/CVE-2021-2385.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2387 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2387
https://linux.oracle.com/cve/CVE-2021-2387.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2389 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389
https://linux.oracle.com/cve/CVE-2021-2389.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-2
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.zerodayinitiative.com/advisories/ZDI-21-880/
| +| libmysqlclient-dev | CVE-2021-2390 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2390
https://linux.oracle.com/cve/CVE-2021-2390.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.zerodayinitiative.com/advisories/ZDI-21-881/
| +| libmysqlclient-dev | CVE-2021-2399 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2399
https://linux.oracle.com/cve/CVE-2021-2399.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2402 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2402
https://linux.oracle.com/cve/CVE-2021-2402.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2410 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2410
https://linux.oracle.com/cve/CVE-2021-2410.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2417 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2417
https://linux.oracle.com/cve/CVE-2021-2417.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2418 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2418
https://linux.oracle.com/cve/CVE-2021-2418.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2422 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2422
https://linux.oracle.com/cve/CVE-2021-2422.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2424 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2424
https://linux.oracle.com/cve/CVE-2021-2424.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2425 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2425
https://linux.oracle.com/cve/CVE-2021-2425.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2426 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2426
https://linux.oracle.com/cve/CVE-2021-2426.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2427 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2427
https://linux.oracle.com/cve/CVE-2021-2427.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2429 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2429
https://linux.oracle.com/cve/CVE-2021-2429.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.zerodayinitiative.com/advisories/ZDI-21-889/
| +| libmysqlclient-dev | CVE-2021-2437 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2437
https://linux.oracle.com/cve/CVE-2021-2437.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2440 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2440
https://linux.oracle.com/cve/CVE-2021-2440.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2441 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2441
https://linux.oracle.com/cve/CVE-2021-2441.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient-dev | CVE-2021-2471 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2471
https://nvd.nist.gov/vuln/detail/CVE-2021-2471
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-2478 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2478
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-2479 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2479
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-2481 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2481
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35537 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35537
https://security.netapp.com/advisory/ntap-20211022-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35546 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35546
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35575 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35575
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35577 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35577
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35583 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35583
https://security.netapp.com/advisory/ntap-20211022-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35584 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35584
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35591 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35591
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35596 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35596
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35597 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35597
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0005/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35602 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35602
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35604 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35607 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35607
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35608 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35608
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35610 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35610
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35612 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35612
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35613 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35613
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35622 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35622
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35623 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35623
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35624 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35624
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35625 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35625
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35626 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35626
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35627 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35627
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35628 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35628
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35629 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35629
https://security.netapp.com/advisory/ntap-20211022-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35630 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35630
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35631 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35631
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35632 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35632
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35633 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35633
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35634 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35634
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35635 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35635
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35636 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35636
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35637 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35637
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35638 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35638
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35639 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35639
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35640 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35640
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35641 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35641
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35642 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35642
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35643 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35643
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35644 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35644
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35645 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35645
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35646 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35646
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35647 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35647
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-35648 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35648
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient-dev | CVE-2021-46322 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46322
https://github.com/svaarala/duktape/issues/2448
| +| libmysqlclient-dev | CVE-2022-21245 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21245
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21249 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21249
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21253 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21253
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21254 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21254
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21256 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21256
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21264 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21264
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21265 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21265
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21270 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21270
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21278 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21278
https://security.netapp.com/advisory/ntap-20220121-0008/
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21297 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21297
https://security.netapp.com/advisory/ntap-20220121-0008/
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21301 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21301
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21302 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21302
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21303 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21303
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21304 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21304
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21339 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21339
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21342 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21342
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21344 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21344
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21348 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21348
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21351 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21351
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21352 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21352
https://security.netapp.com/advisory/ntap-20220121-0008/
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21358 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21358
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21362 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21362
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21367 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21367
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21368 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21368
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21370 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21370
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21372 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21372
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21374 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21374
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21378 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21378
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient-dev | CVE-2022-21379 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21379
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2021-2339 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2339
https://linux.oracle.com/cve/CVE-2021-2339.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2340 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2340
https://linux.oracle.com/cve/CVE-2021-2340.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2342 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2342
https://linux.oracle.com/cve/CVE-2021-2342.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2352 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2352
https://linux.oracle.com/cve/CVE-2021-2352.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2354 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2354
https://linux.oracle.com/cve/CVE-2021-2354.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2356 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2356
https://linux.oracle.com/cve/CVE-2021-2356.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2357 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2357
https://linux.oracle.com/cve/CVE-2021-2357.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2367 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2367
https://linux.oracle.com/cve/CVE-2021-2367.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2370 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2370
https://linux.oracle.com/cve/CVE-2021-2370.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2372 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372
https://linux.oracle.com/cve/CVE-2021-2372.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-2
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2374 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2374
https://linux.oracle.com/cve/CVE-2021-2374.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2383 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2383
https://linux.oracle.com/cve/CVE-2021-2383.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2384 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2384
https://linux.oracle.com/cve/CVE-2021-2384.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2385 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2385
https://linux.oracle.com/cve/CVE-2021-2385.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2387 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2387
https://linux.oracle.com/cve/CVE-2021-2387.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2389 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389
https://linux.oracle.com/cve/CVE-2021-2389.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-2
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.zerodayinitiative.com/advisories/ZDI-21-880/
| +| libmysqlclient21 | CVE-2021-2390 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2390
https://linux.oracle.com/cve/CVE-2021-2390.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.zerodayinitiative.com/advisories/ZDI-21-881/
| +| libmysqlclient21 | CVE-2021-2399 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2399
https://linux.oracle.com/cve/CVE-2021-2399.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2402 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2402
https://linux.oracle.com/cve/CVE-2021-2402.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2410 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2410
https://linux.oracle.com/cve/CVE-2021-2410.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2417 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2417
https://linux.oracle.com/cve/CVE-2021-2417.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2418 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2418
https://linux.oracle.com/cve/CVE-2021-2418.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2422 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2422
https://linux.oracle.com/cve/CVE-2021-2422.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2424 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2424
https://linux.oracle.com/cve/CVE-2021-2424.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2425 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2425
https://linux.oracle.com/cve/CVE-2021-2425.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2426 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2426
https://linux.oracle.com/cve/CVE-2021-2426.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2427 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2427
https://linux.oracle.com/cve/CVE-2021-2427.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2429 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2429
https://linux.oracle.com/cve/CVE-2021-2429.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.zerodayinitiative.com/advisories/ZDI-21-889/
| +| libmysqlclient21 | CVE-2021-2437 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2437
https://linux.oracle.com/cve/CVE-2021-2437.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2440 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2440
https://linux.oracle.com/cve/CVE-2021-2440.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2441 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2441
https://linux.oracle.com/cve/CVE-2021-2441.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
| +| libmysqlclient21 | CVE-2021-2471 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2471
https://nvd.nist.gov/vuln/detail/CVE-2021-2471
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-2478 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2478
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-2479 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2479
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-2481 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2481
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35537 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35537
https://security.netapp.com/advisory/ntap-20211022-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35546 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35546
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35575 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35575
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35577 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35577
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35583 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35583
https://security.netapp.com/advisory/ntap-20211022-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35584 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35584
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35591 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35591
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35596 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35596
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35597 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35597
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0005/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35602 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35602
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35604 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35607 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35607
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35608 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35608
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35610 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35610
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35612 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35612
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35613 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35613
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35622 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35622
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35623 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35623
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35624 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35624
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35625 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35625
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35626 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35626
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35627 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35627
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35628 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35628
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35629 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.26-0ubuntu0.20.04.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35629
https://security.netapp.com/advisory/ntap-20211022-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35630 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35630
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35631 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35631
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35632 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35632
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35633 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35633
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35634 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35634
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35635 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35635
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35636 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35636
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35637 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35637
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35638 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35638
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35639 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35639
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35640 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35640
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35641 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35641
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35642 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35642
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35643 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35643
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35644 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35644
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35645 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35645
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35646 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35646
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35647 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35647
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-35648 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35648
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient21 | CVE-2021-46322 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46322
https://github.com/svaarala/duktape/issues/2448
| +| libmysqlclient21 | CVE-2022-21245 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21245
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21249 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21249
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21253 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21253
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21254 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21254
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21256 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21256
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21264 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21264
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21265 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21265
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21270 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21270
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21278 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21278
https://security.netapp.com/advisory/ntap-20220121-0008/
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21297 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21297
https://security.netapp.com/advisory/ntap-20220121-0008/
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21301 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21301
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21302 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21302
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21303 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21303
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21304 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21304
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21339 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21339
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21342 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21342
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21344 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21344
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21348 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21348
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21351 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21351
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21352 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.27-0ubuntu0.20.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21352
https://security.netapp.com/advisory/ntap-20220121-0008/
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21358 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21358
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21362 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21362
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21367 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21367
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21368 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21368
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21370 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21370
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21372 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21372
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21374 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21374
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21378 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21378
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libmysqlclient21 | CVE-2022-21379 | MEDIUM | 8.0.25-0ubuntu0.20.04.1 | 8.0.28-0ubuntu0.20.04.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21379
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libnss3 | CVE-2021-43527 | HIGH | 2:3.49.1-1ubuntu1.5 | 2:3.49.1-1ubuntu1.6 |
Expand...https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/
https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html
https://linux.oracle.com/cve/CVE-2021-43527.html
https://linux.oracle.com/errata/ELSA-2021-9591.html
https://security.netapp.com/advisory/ntap-20211229-0002/
https://ubuntu.com/security/notices/USN-5168-1
https://ubuntu.com/security/notices/USN-5168-2
https://ubuntu.com/security/notices/USN-5168-3
https://ubuntu.com/security/notices/USN-5168-4
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
https://www.mozilla.org/security/advisories/mfsa2021-51/
| +| libnss3 | CVE-2020-25648 | LOW | 2:3.49.1-1ubuntu1.5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1887319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
https://linux.oracle.com/cve/CVE-2020-25648.html
https://linux.oracle.com/errata/ELSA-2021-3572.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libopenexr-dev | CVE-2021-20296 | LOW | 2.3.0-6ubuntu0.5 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
https://bugzilla.redhat.com/show_bug.cgi?id=1939141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
https://www.openexr.com/
| +| libopenexr-dev | CVE-2021-3598 | LOW | 2.3.0-6ubuntu0.5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598
https://github.com/AcademySoftwareFoundation/openexr/pull/1037
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
| +| libopenexr-dev | CVE-2021-45942 | LOW | 2.3.0-6ubuntu0.5 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942
https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022
https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e
https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0
https://github.com/AcademySoftwareFoundation/openexr/pull/1209
https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml
| +| libopenexr24 | CVE-2021-20296 | LOW | 2.3.0-6ubuntu0.5 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
https://bugzilla.redhat.com/show_bug.cgi?id=1939141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
https://www.openexr.com/
| +| libopenexr24 | CVE-2021-3598 | LOW | 2.3.0-6ubuntu0.5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598
https://github.com/AcademySoftwareFoundation/openexr/pull/1037
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
| +| libopenexr24 | CVE-2021-45942 | LOW | 2.3.0-6ubuntu0.5 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942
https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022
https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e
https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0
https://github.com/AcademySoftwareFoundation/openexr/pull/1209
https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml
| +| libopenjp2-7 | CVE-2019-6988 | LOW | 2.3.1-1ubuntu4.20.04.1 | |
Expand...http://www.securityfocus.com/bid/106785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
| +| libopenjp2-7 | CVE-2021-29338 | LOW | 2.3.1-1ubuntu4.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://github.com/uclouvain/openjpeg/pull/1395
https://github.com/uclouvain/openjpeg/pull/1396
https://github.com/uclouvain/openjpeg/pull/1397
https://github.com/uclouvain/openjpeg/pull/1398
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
| +| libopenjp2-7 | CVE-2021-3575 | LOW | 2.3.1-1ubuntu4.20.04.1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1957616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
https://github.com/uclouvain/openjpeg/issues/1347
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://ubuntu.com/security/CVE-2021-3575
| +| libpam-systemd | CVE-2021-33910 | HIGH | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
| +| libpam-systemd | CVE-2021-3997 | MEDIUM | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.15 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libpam-systemd | CVE-2020-13529 | LOW | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libpcre16-3 | CVE-2017-11164 | LOW | 2:8.39-12build1 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre16-3 | CVE-2019-20838 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre16-3 | CVE-2020-14155 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12build1 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2020-14155 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3-dev | CVE-2017-11164 | LOW | 2:8.39-12build1 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3-dev | CVE-2019-20838 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3-dev | CVE-2020-14155 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre32-3 | CVE-2017-11164 | LOW | 2:8.39-12build1 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre32-3 | CVE-2019-20838 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre32-3 | CVE-2020-14155 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcrecpp0v5 | CVE-2017-11164 | LOW | 2:8.39-12build1 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcrecpp0v5 | CVE-2019-20838 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcrecpp0v5 | CVE-2020-14155 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libperl5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| libpolkit-agent-1-0 | CVE-2021-4034 | HIGH | 0.105-26ubuntu1.1 | 0.105-26ubuntu1.2 |
Expand...http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html
http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html
https://access.redhat.com/security/vulnerabilities/RHSB-2022-001
https://bugzilla.redhat.com/show_bug.cgi?id=2025869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034
https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
https://linux.oracle.com/cve/CVE-2021-4034.html
https://linux.oracle.com/errata/ELSA-2022-9073.html
https://ubuntu.com/security/notices/USN-5252-1
https://ubuntu.com/security/notices/USN-5252-2
https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
| +| libpolkit-agent-1-0 | CVE-2021-4115 | MEDIUM | 0.105-26ubuntu1.1 | 0.105-26ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/cve-2021-4115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115
https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e
https://gitlab.freedesktop.org/polkit/polkit/-/issues/141
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/
https://securitylab.github.com/advisories/GHSL-2021-077-polkit/
https://ubuntu.com/security/notices/USN-5304-1
| +| libpolkit-agent-1-0 | CVE-2016-2568 | LOW | 0.105-26ubuntu1.1 | |
Expand...http://seclists.org/oss-sec/2016/q1/443
http://www.openwall.com/lists/oss-security/2016/02/26/3
https://access.redhat.com/security/cve/cve-2016-2568
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062
https://bugzilla.redhat.com/show_bug.cgi?id=1300746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568
https://lore.kernel.org/patchwork/patch/793178/
https://ubuntu.com/security/CVE-2016-2568
| +| libpolkit-gobject-1-0 | CVE-2021-4034 | HIGH | 0.105-26ubuntu1.1 | 0.105-26ubuntu1.2 |
Expand...http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html
http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html
https://access.redhat.com/security/vulnerabilities/RHSB-2022-001
https://bugzilla.redhat.com/show_bug.cgi?id=2025869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034
https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
https://linux.oracle.com/cve/CVE-2021-4034.html
https://linux.oracle.com/errata/ELSA-2022-9073.html
https://ubuntu.com/security/notices/USN-5252-1
https://ubuntu.com/security/notices/USN-5252-2
https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
| +| libpolkit-gobject-1-0 | CVE-2021-4115 | MEDIUM | 0.105-26ubuntu1.1 | 0.105-26ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/cve-2021-4115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115
https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e
https://gitlab.freedesktop.org/polkit/polkit/-/issues/141
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/
https://securitylab.github.com/advisories/GHSL-2021-077-polkit/
https://ubuntu.com/security/notices/USN-5304-1
| +| libpolkit-gobject-1-0 | CVE-2016-2568 | LOW | 0.105-26ubuntu1.1 | |
Expand...http://seclists.org/oss-sec/2016/q1/443
http://www.openwall.com/lists/oss-security/2016/02/26/3
https://access.redhat.com/security/cve/cve-2016-2568
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062
https://bugzilla.redhat.com/show_bug.cgi?id=1300746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568
https://lore.kernel.org/patchwork/patch/793178/
https://ubuntu.com/security/CVE-2016-2568
| +| libpoppler-glib8 | CVE-2019-9543 | LOW | 0.86.1-0ubuntu1 | |
Expand...http://www.securityfocus.com/bid/107238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543
https://gitlab.freedesktop.org/poppler/poppler/issues/730
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/
| +| libpoppler-glib8 | CVE-2019-9545 | LOW | 0.86.1-0ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545
https://gitlab.freedesktop.org/poppler/poppler/issues/731
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/
| +| libpoppler97 | CVE-2019-9543 | LOW | 0.86.1-0ubuntu1 | |
Expand...http://www.securityfocus.com/bid/107238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543
https://gitlab.freedesktop.org/poppler/poppler/issues/730
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/
| +| libpoppler97 | CVE-2019-9545 | LOW | 0.86.1-0ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545
https://gitlab.freedesktop.org/poppler/poppler/issues/731
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/
| +| libpq-dev | CVE-2021-3449 | HIGH | 12.7-0ubuntu0.20.04.1 | 12.8-0ubuntu0.20.04.1 |
Expand...http://www.openwall.com/lists/oss-security/2021/03/27/1
http://www.openwall.com/lists/oss-security/2021/03/27/2
http://www.openwall.com/lists/oss-security/2021/03/28/3
http://www.openwall.com/lists/oss-security/2021/03/28/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845
https://kc.mcafee.com/corporate/index?page=content&id=SB10356
https://linux.oracle.com/cve/CVE-2021-3449.html
https://linux.oracle.com/errata/ELSA-2021-9151.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210326-0006/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
https://ubuntu.com/security/notices/USN-4891-1
https://ubuntu.com/security/notices/USN-5038-1
https://www.debian.org/security/2021/dsa-4875
https://www.openssl.org/news/secadv/20210325.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-05
https://www.tenable.com/security/tns-2021-06
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
| +| libpq-dev | CVE-2021-23214 | MEDIUM | 12.7-0ubuntu0.20.04.1 | 12.9-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2022666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951
https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951
https://linux.oracle.com/cve/CVE-2021-23214.html
https://linux.oracle.com/errata/ELSA-2021-5236.html
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
https://www.postgresql.org/support/security/CVE-2021-23214/
| +| libpq-dev | CVE-2021-23222 | MEDIUM | 12.7-0ubuntu0.20.04.1 | 12.9-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2022675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228
https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
https://www.postgresql.org/support/security/CVE-2021-23222/
| +| libpq-dev | CVE-2021-3677 | MEDIUM | 12.7-0ubuntu0.20.04.1 | 12.8-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2001857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677
https://linux.oracle.com/cve/CVE-2021-3677.html
https://linux.oracle.com/errata/ELSA-2021-5236.html
https://ubuntu.com/security/notices/USN-5038-1
https://www.postgresql.org/support/security/CVE-2021-3677/
| +| libpq5 | CVE-2021-3449 | HIGH | 12.7-0ubuntu0.20.04.1 | 12.8-0ubuntu0.20.04.1 |
Expand...http://www.openwall.com/lists/oss-security/2021/03/27/1
http://www.openwall.com/lists/oss-security/2021/03/27/2
http://www.openwall.com/lists/oss-security/2021/03/28/3
http://www.openwall.com/lists/oss-security/2021/03/28/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845
https://kc.mcafee.com/corporate/index?page=content&id=SB10356
https://linux.oracle.com/cve/CVE-2021-3449.html
https://linux.oracle.com/errata/ELSA-2021-9151.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210326-0006/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
https://ubuntu.com/security/notices/USN-4891-1
https://ubuntu.com/security/notices/USN-5038-1
https://www.debian.org/security/2021/dsa-4875
https://www.openssl.org/news/secadv/20210325.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-05
https://www.tenable.com/security/tns-2021-06
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
| +| libpq5 | CVE-2021-23214 | MEDIUM | 12.7-0ubuntu0.20.04.1 | 12.9-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2022666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951
https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951
https://linux.oracle.com/cve/CVE-2021-23214.html
https://linux.oracle.com/errata/ELSA-2021-5236.html
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
https://www.postgresql.org/support/security/CVE-2021-23214/
| +| libpq5 | CVE-2021-23222 | MEDIUM | 12.7-0ubuntu0.20.04.1 | 12.9-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2022675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=d83cdfdca9d918bbbd6bb209139b94c954da7228
https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
https://www.postgresql.org/support/security/CVE-2021-23222/
| +| libpq5 | CVE-2021-3677 | MEDIUM | 12.7-0ubuntu0.20.04.1 | 12.8-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2001857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677
https://linux.oracle.com/cve/CVE-2021-3677.html
https://linux.oracle.com/errata/ELSA-2021-5236.html
https://ubuntu.com/security/notices/USN-5038-1
https://www.postgresql.org/support/security/CVE-2021-3677/
| +| libpython3.8 | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 |
Expand...https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.8 | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.2 |
Expand...https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| libpython3.8 | CVE-2022-0391 | MEDIUM | 3.8.10-0ubuntu1~20.04 | |
Expand...https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://security.netapp.com/advisory/ntap-20220225-0009/
| +| libpython3.8-minimal | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 |
Expand...https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.8-minimal | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.2 |
Expand...https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| libpython3.8-minimal | CVE-2022-0391 | MEDIUM | 3.8.10-0ubuntu1~20.04 | |
Expand...https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://security.netapp.com/advisory/ntap-20220225-0009/
| +| libpython3.8-stdlib | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 |
Expand...https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.8-stdlib | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.2 |
Expand...https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| libpython3.8-stdlib | CVE-2022-0391 | MEDIUM | 3.8.10-0ubuntu1~20.04 | |
Expand...https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://security.netapp.com/advisory/ntap-20220225-0009/
| +| libqt5concurrent5 | CVE-2020-13962 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html
https://bugreports.qt.io/browse/QTBUG-83450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962
https://github.com/mumble-voip/mumble/issues/3679
https://github.com/mumble-voip/mumble/pull/4032
https://linux.oracle.com/cve/CVE-2020-13962.html
https://linux.oracle.com/errata/ELSA-2020-4690.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/
https://security.gentoo.org/glsa/202007-18
| +| libqt5concurrent5 | CVE-2022-25255 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...https://codereview.qt-project.org/c/qt/qtbase/+/393113
https://codereview.qt-project.org/c/qt/qtbase/+/394914
https://codereview.qt-project.org/c/qt/qtbase/+/396020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255
https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff
https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
| +| libqt5concurrent5 | CVE-2020-17507 | LOW | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html
https://codereview.qt-project.org/c/qt/qtbase/+/308436
https://codereview.qt-project.org/c/qt/qtbase/+/308495
https://codereview.qt-project.org/c/qt/qtbase/+/308496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507
https://linux.oracle.com/cve/CVE-2020-17507.html
https://linux.oracle.com/errata/ELSA-2021-1756.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/
https://security.gentoo.org/glsa/202009-04
https://ubuntu.com/security/notices/USN-5081-1
| +| libqt5core5a | CVE-2020-13962 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html
https://bugreports.qt.io/browse/QTBUG-83450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962
https://github.com/mumble-voip/mumble/issues/3679
https://github.com/mumble-voip/mumble/pull/4032
https://linux.oracle.com/cve/CVE-2020-13962.html
https://linux.oracle.com/errata/ELSA-2020-4690.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/
https://security.gentoo.org/glsa/202007-18
| +| libqt5core5a | CVE-2022-25255 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...https://codereview.qt-project.org/c/qt/qtbase/+/393113
https://codereview.qt-project.org/c/qt/qtbase/+/394914
https://codereview.qt-project.org/c/qt/qtbase/+/396020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255
https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff
https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
| +| libqt5core5a | CVE-2020-17507 | LOW | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html
https://codereview.qt-project.org/c/qt/qtbase/+/308436
https://codereview.qt-project.org/c/qt/qtbase/+/308495
https://codereview.qt-project.org/c/qt/qtbase/+/308496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507
https://linux.oracle.com/cve/CVE-2020-17507.html
https://linux.oracle.com/errata/ELSA-2021-1756.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/
https://security.gentoo.org/glsa/202009-04
https://ubuntu.com/security/notices/USN-5081-1
| +| libqt5dbus5 | CVE-2020-13962 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html
https://bugreports.qt.io/browse/QTBUG-83450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962
https://github.com/mumble-voip/mumble/issues/3679
https://github.com/mumble-voip/mumble/pull/4032
https://linux.oracle.com/cve/CVE-2020-13962.html
https://linux.oracle.com/errata/ELSA-2020-4690.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/
https://security.gentoo.org/glsa/202007-18
| +| libqt5dbus5 | CVE-2022-25255 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...https://codereview.qt-project.org/c/qt/qtbase/+/393113
https://codereview.qt-project.org/c/qt/qtbase/+/394914
https://codereview.qt-project.org/c/qt/qtbase/+/396020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255
https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff
https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
| +| libqt5dbus5 | CVE-2020-17507 | LOW | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html
https://codereview.qt-project.org/c/qt/qtbase/+/308436
https://codereview.qt-project.org/c/qt/qtbase/+/308495
https://codereview.qt-project.org/c/qt/qtbase/+/308496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507
https://linux.oracle.com/cve/CVE-2020-17507.html
https://linux.oracle.com/errata/ELSA-2021-1756.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/
https://security.gentoo.org/glsa/202009-04
https://ubuntu.com/security/notices/USN-5081-1
| +| libqt5gui5 | CVE-2020-13962 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html
https://bugreports.qt.io/browse/QTBUG-83450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962
https://github.com/mumble-voip/mumble/issues/3679
https://github.com/mumble-voip/mumble/pull/4032
https://linux.oracle.com/cve/CVE-2020-13962.html
https://linux.oracle.com/errata/ELSA-2020-4690.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/
https://security.gentoo.org/glsa/202007-18
| +| libqt5gui5 | CVE-2022-25255 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...https://codereview.qt-project.org/c/qt/qtbase/+/393113
https://codereview.qt-project.org/c/qt/qtbase/+/394914
https://codereview.qt-project.org/c/qt/qtbase/+/396020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255
https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff
https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
| +| libqt5gui5 | CVE-2020-17507 | LOW | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html
https://codereview.qt-project.org/c/qt/qtbase/+/308436
https://codereview.qt-project.org/c/qt/qtbase/+/308495
https://codereview.qt-project.org/c/qt/qtbase/+/308496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507
https://linux.oracle.com/cve/CVE-2020-17507.html
https://linux.oracle.com/errata/ELSA-2021-1756.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/
https://security.gentoo.org/glsa/202009-04
https://ubuntu.com/security/notices/USN-5081-1
| +| libqt5network5 | CVE-2020-13962 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html
https://bugreports.qt.io/browse/QTBUG-83450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962
https://github.com/mumble-voip/mumble/issues/3679
https://github.com/mumble-voip/mumble/pull/4032
https://linux.oracle.com/cve/CVE-2020-13962.html
https://linux.oracle.com/errata/ELSA-2020-4690.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/
https://security.gentoo.org/glsa/202007-18
| +| libqt5network5 | CVE-2022-25255 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...https://codereview.qt-project.org/c/qt/qtbase/+/393113
https://codereview.qt-project.org/c/qt/qtbase/+/394914
https://codereview.qt-project.org/c/qt/qtbase/+/396020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255
https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff
https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
| +| libqt5network5 | CVE-2020-17507 | LOW | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html
https://codereview.qt-project.org/c/qt/qtbase/+/308436
https://codereview.qt-project.org/c/qt/qtbase/+/308495
https://codereview.qt-project.org/c/qt/qtbase/+/308496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507
https://linux.oracle.com/cve/CVE-2020-17507.html
https://linux.oracle.com/errata/ELSA-2021-1756.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/
https://security.gentoo.org/glsa/202009-04
https://ubuntu.com/security/notices/USN-5081-1
| +| libqt5printsupport5 | CVE-2020-13962 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html
https://bugreports.qt.io/browse/QTBUG-83450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962
https://github.com/mumble-voip/mumble/issues/3679
https://github.com/mumble-voip/mumble/pull/4032
https://linux.oracle.com/cve/CVE-2020-13962.html
https://linux.oracle.com/errata/ELSA-2020-4690.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/
https://security.gentoo.org/glsa/202007-18
| +| libqt5printsupport5 | CVE-2022-25255 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...https://codereview.qt-project.org/c/qt/qtbase/+/393113
https://codereview.qt-project.org/c/qt/qtbase/+/394914
https://codereview.qt-project.org/c/qt/qtbase/+/396020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255
https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff
https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
| +| libqt5printsupport5 | CVE-2020-17507 | LOW | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html
https://codereview.qt-project.org/c/qt/qtbase/+/308436
https://codereview.qt-project.org/c/qt/qtbase/+/308495
https://codereview.qt-project.org/c/qt/qtbase/+/308496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507
https://linux.oracle.com/cve/CVE-2020-17507.html
https://linux.oracle.com/errata/ELSA-2021-1756.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/
https://security.gentoo.org/glsa/202009-04
https://ubuntu.com/security/notices/USN-5081-1
| +| libqt5widgets5 | CVE-2020-13962 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html
https://bugreports.qt.io/browse/QTBUG-83450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962
https://github.com/mumble-voip/mumble/issues/3679
https://github.com/mumble-voip/mumble/pull/4032
https://linux.oracle.com/cve/CVE-2020-13962.html
https://linux.oracle.com/errata/ELSA-2020-4690.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/
https://security.gentoo.org/glsa/202007-18
| +| libqt5widgets5 | CVE-2022-25255 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...https://codereview.qt-project.org/c/qt/qtbase/+/393113
https://codereview.qt-project.org/c/qt/qtbase/+/394914
https://codereview.qt-project.org/c/qt/qtbase/+/396020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255
https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff
https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
| +| libqt5widgets5 | CVE-2020-17507 | LOW | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html
https://codereview.qt-project.org/c/qt/qtbase/+/308436
https://codereview.qt-project.org/c/qt/qtbase/+/308495
https://codereview.qt-project.org/c/qt/qtbase/+/308496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507
https://linux.oracle.com/cve/CVE-2020-17507.html
https://linux.oracle.com/errata/ELSA-2021-1756.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/
https://security.gentoo.org/glsa/202009-04
https://ubuntu.com/security/notices/USN-5081-1
| +| libqt5xml5 | CVE-2020-13962 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html
https://bugreports.qt.io/browse/QTBUG-83450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962
https://github.com/mumble-voip/mumble/issues/3679
https://github.com/mumble-voip/mumble/pull/4032
https://linux.oracle.com/cve/CVE-2020-13962.html
https://linux.oracle.com/errata/ELSA-2020-4690.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/
https://security.gentoo.org/glsa/202007-18
| +| libqt5xml5 | CVE-2022-25255 | MEDIUM | 5.12.8+dfsg-0ubuntu1 | |
Expand...https://codereview.qt-project.org/c/qt/qtbase/+/393113
https://codereview.qt-project.org/c/qt/qtbase/+/394914
https://codereview.qt-project.org/c/qt/qtbase/+/396020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255
https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff
https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
| +| libqt5xml5 | CVE-2020-17507 | LOW | 5.12.8+dfsg-0ubuntu1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html
https://codereview.qt-project.org/c/qt/qtbase/+/308436
https://codereview.qt-project.org/c/qt/qtbase/+/308495
https://codereview.qt-project.org/c/qt/qtbase/+/308496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507
https://linux.oracle.com/cve/CVE-2020-17507.html
https://linux.oracle.com/errata/ELSA-2021-1756.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/426FCC6JNK4JUEX5QHJQDYQ6MUVQ3E6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBPZVZNEYXGATTXM4WOE7OQ55VAKPVD6/
https://security.gentoo.org/glsa/202009-04
https://ubuntu.com/security/notices/USN-5081-1
| +| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libsasl2-2 | CVE-2022-24407 | HIGH | 2.1.27+dfsg-2 | 2.1.27+dfsg-2ubuntu0.1 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
https://linux.oracle.com/cve/CVE-2022-24407.html
https://linux.oracle.com/errata/ELSA-2022-9239.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
https://ubuntu.com/security/notices/USN-5301-1
https://ubuntu.com/security/notices/USN-5301-2
https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
https://www.debian.org/security/2022/dsa-5087
| +| libsasl2-modules-db | CVE-2022-24407 | HIGH | 2.1.27+dfsg-2 | 2.1.27+dfsg-2ubuntu0.1 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
https://linux.oracle.com/cve/CVE-2022-24407.html
https://linux.oracle.com/errata/ELSA-2022-9239.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
https://ubuntu.com/security/notices/USN-5301-1
https://ubuntu.com/security/notices/USN-5301-2
https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
https://www.debian.org/security/2022/dsa-5087
| +| libsepol1 | CVE-2021-36084 | LOW | 3.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 3.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 3.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 3.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libsmartcols1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libsmbclient | CVE-2021-44142 | HIGH | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://bugzilla.samba.org/show_bug.cgi?id=14914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
https://kb.cert.org/vuls/id/119678
https://linux.oracle.com/cve/CVE-2021-44142.html
https://linux.oracle.com/errata/ELSA-2022-0332.html
https://ubuntu.com/security/notices/USN-5260-1
https://ubuntu.com/security/notices/USN-5260-2
https://ubuntu.com/security/notices/USN-5260-3
https://www.samba.org/samba/security/CVE-2021-44142.html
https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin
| +| libsmbclient | CVE-2016-2124 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
https://linux.oracle.com/cve/CVE-2016-2124.html
https://linux.oracle.com/errata/ELSA-2021-5192.html
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2016-2124.html
| +| libsmbclient | CVE-2020-25717 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
https://linux.oracle.com/cve/CVE-2020-25717.html
https://linux.oracle.com/errata/ELSA-2021-5192.html
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25717.html
| +| libsmbclient | CVE-2020-25718 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25718.html
| +| libsmbclient | CVE-2020-25719 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
https://linux.oracle.com/cve/CVE-2020-25719.html
https://linux.oracle.com/errata/ELSA-2021-5195.html
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25719.html
| +| libsmbclient | CVE-2020-25721 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2021728
https://bugzilla.samba.org/show_bug.cgi?id=14725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25721.html
| +| libsmbclient | CVE-2020-25722 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25722.html
| +| libsmbclient | CVE-2021-23192 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
https://linux.oracle.com/cve/CVE-2021-23192.html
https://linux.oracle.com/errata/ELSA-2021-5082.html
https://ubuntu.com/security/CVE-2021-23192
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2021-23192.html
| +| libsmbclient | CVE-2021-3738 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2021726
https://bugzilla.samba.org/show_bug.cgi?id=14468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2021-3738.html
| +| libsmbclient | CVE-2022-0336 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
https://ubuntu.com/security/notices/USN-5260-1
https://www.samba.org/samba/security/CVE-2022-0336.html
| +| libsmbclient | CVE-2021-3671 | LOW | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libsmbclient | CVE-2021-43566 | LOW | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://bugzilla.samba.org/show_bug.cgi?id=13979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566
https://ubuntu.com/security/notices/USN-5260-1
https://www.samba.org/samba/history/
https://www.samba.org/samba/security/CVE-2021-43566.html
| +| libsndfile1 | CVE-2021-3246 | MEDIUM | 1.0.28-7 | 1.0.28-7ubuntu0.1 |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3246
https://github.com/libsndfile/libsndfile/issues/687
https://linux.oracle.com/cve/CVE-2021-3246.html
https://linux.oracle.com/errata/ELSA-2021-3295.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUDCEMMPRA3IYYYHVZUOUZXI65FU37V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7LNW4AVDVL3BU3N3KGVFLTYFASBVCIF/
https://ubuntu.com/security/notices/USN-5025-1
https://ubuntu.com/security/notices/USN-5025-2
https://www.debian.org/security/2021/dsa-4947
| +| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| +| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| +| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libsqlite3-dev | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| +| libsqlite3-dev | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| +| libsqlite3-dev | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| +| libsqlite3-dev | CVE-2021-36690 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh-4 | CVE-2021-3634 | MEDIUM | 0.9.3-2ubuntu2.1 | 0.9.3-2ubuntu2.2 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1978810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3634
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRK67AJCWYYVAGF5SGAHNZXCX3PN3ZFP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKYD3ZRAMDAQX3ZW6THHUF3GXN7FF6B4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVWAAB2XMKEUMPMDALINKAA4U2QM4LNG/
https://security.netapp.com/advisory/ntap-20211004-0003/
https://ubuntu.com/security/notices/USN-5053-1
https://www.debian.org/security/2021/dsa-4965
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libssl-dev | CVE-2021-3711 | HIGH | 1.1.1f-1ubuntu2.4 | 1.1.1f-1ubuntu2.8 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| libssl-dev | CVE-2022-0778 | HIGH | 1.1.1f-1ubuntu2.4 | 1.1.1f-1ubuntu2.12 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9246.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| libssl-dev | CVE-2021-3712 | MEDIUM | 1.1.1f-1ubuntu2.4 | 1.1.1f-1ubuntu2.8 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| libssl1.1 | CVE-2021-3711 | HIGH | 1.1.1f-1ubuntu2.4 | 1.1.1f-1ubuntu2.8 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1f-1ubuntu2.4 | 1.1.1f-1ubuntu2.12 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9246.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| libssl1.1 | CVE-2021-3712 | MEDIUM | 1.1.1f-1ubuntu2.4 | 1.1.1f-1ubuntu2.8 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| libstdc++-9-dev | CVE-2020-13844 | MEDIUM | 9.3.0-17ubuntu1~20.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| +| libsvn1 | CVE-2018-11803 | MEDIUM | 1.13.0-3 | |
Expand...http://www.securityfocus.com/bid/106770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11803
https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003@%3Cdev.subversion.apache.org%3E
https://security.gentoo.org/glsa/201904-08
https://subversion.apache.org/security/CVE-2018-11803-advisory.txt
https://ubuntu.com/security/notices/USN-3869-1
https://usn.ubuntu.com/3869-1/
| +| libsvn1 | CVE-2020-17525 | MEDIUM | 1.13.0-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525
https://linux.oracle.com/cve/CVE-2020-17525.html
https://linux.oracle.com/errata/ELSA-2021-0507.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html
https://subversion.apache.org/security/CVE-2020-17525-advisory.txt
https://ubuntu.com/security/notices/USN-5322-1
| +| libsystemd0 | CVE-2021-33910 | HIGH | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.15 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2020-13529 | LOW | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.16.0-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtiff-dev | CVE-2020-19143 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.1 | 4.1.0+git191117-2ubuntu0.20.04.2 |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19143
https://gitlab.com/libtiff/libtiff/-/issues/158
https://gitlab.com/libtiff/libtiff/-/merge_requests/119
https://security.netapp.com/advisory/ntap-20211004-0005/
https://ubuntu.com/security/notices/USN-5084-1
https://www.debian.org/security/2021/dsa-4997
| +| libtiff-dev | CVE-2022-0865 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
https://gitlab.com/libtiff/libtiff/-/issues/385
https://gitlab.com/libtiff/libtiff/-/merge_requests/306
https://www.debian.org/security/2022/dsa-5108
| +| libtiff-dev | CVE-2022-0891 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/libtiff/libtiff/-/issues/380
https://gitlab.com/libtiff/libtiff/-/issues/382
https://www.debian.org/security/2022/dsa-5108
| +| libtiff-dev | CVE-2018-10126 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtiff-dev | CVE-2020-35522 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522
https://gitlab.com/libtiff/libtiff/-/merge_requests/165
https://linux.oracle.com/cve/CVE-2020-35522.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
| +| libtiff-dev | CVE-2022-0561 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff-dev | CVE-2022-0562 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562
https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff-dev | CVE-2022-22844 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2020-19143 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.1 | 4.1.0+git191117-2ubuntu0.20.04.2 |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19143
https://gitlab.com/libtiff/libtiff/-/issues/158
https://gitlab.com/libtiff/libtiff/-/merge_requests/119
https://security.netapp.com/advisory/ntap-20211004-0005/
https://ubuntu.com/security/notices/USN-5084-1
https://www.debian.org/security/2021/dsa-4997
| +| libtiff5 | CVE-2022-0865 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
https://gitlab.com/libtiff/libtiff/-/issues/385
https://gitlab.com/libtiff/libtiff/-/merge_requests/306
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2022-0891 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/libtiff/libtiff/-/issues/380
https://gitlab.com/libtiff/libtiff/-/issues/382
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2018-10126 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtiff5 | CVE-2020-35522 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522
https://gitlab.com/libtiff/libtiff/-/merge_requests/165
https://linux.oracle.com/cve/CVE-2020-35522.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
| +| libtiff5 | CVE-2022-0561 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2022-0562 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562
https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2022-22844 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2020-19143 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.1 | 4.1.0+git191117-2ubuntu0.20.04.2 |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19143
https://gitlab.com/libtiff/libtiff/-/issues/158
https://gitlab.com/libtiff/libtiff/-/merge_requests/119
https://security.netapp.com/advisory/ntap-20211004-0005/
https://ubuntu.com/security/notices/USN-5084-1
https://www.debian.org/security/2021/dsa-4997
| +| libtiffxx5 | CVE-2022-0865 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
https://gitlab.com/libtiff/libtiff/-/issues/385
https://gitlab.com/libtiff/libtiff/-/merge_requests/306
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2022-0891 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/libtiff/libtiff/-/issues/380
https://gitlab.com/libtiff/libtiff/-/issues/382
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2018-10126 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtiffxx5 | CVE-2020-35522 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522
https://gitlab.com/libtiff/libtiff/-/merge_requests/165
https://linux.oracle.com/cve/CVE-2020-35522.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
| +| libtiffxx5 | CVE-2022-0561 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2022-0562 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562
https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2022-22844 | LOW | 4.1.0+git191117-2ubuntu0.20.04.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
| +| libudev1 | CVE-2021-33910 | HIGH | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
| +| libudev1 | CVE-2021-3997 | MEDIUM | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.15 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2020-13529 | LOW | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudisks2-0 | CVE-2021-3802 | LOW | 2.8.4-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3802
https://bugzilla.redhat.com/show_bug.cgi?id=2003649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3802
https://github.com/storaged-project/udisks/releases/tag/udisks-2.9.4
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt
| +| libuuid1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libuuid1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libwbclient0 | CVE-2021-44142 | HIGH | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://bugzilla.samba.org/show_bug.cgi?id=14914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
https://kb.cert.org/vuls/id/119678
https://linux.oracle.com/cve/CVE-2021-44142.html
https://linux.oracle.com/errata/ELSA-2022-0332.html
https://ubuntu.com/security/notices/USN-5260-1
https://ubuntu.com/security/notices/USN-5260-2
https://ubuntu.com/security/notices/USN-5260-3
https://www.samba.org/samba/security/CVE-2021-44142.html
https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin
| +| libwbclient0 | CVE-2016-2124 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
https://linux.oracle.com/cve/CVE-2016-2124.html
https://linux.oracle.com/errata/ELSA-2021-5192.html
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2016-2124.html
| +| libwbclient0 | CVE-2020-25717 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
https://linux.oracle.com/cve/CVE-2020-25717.html
https://linux.oracle.com/errata/ELSA-2021-5192.html
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25717.html
| +| libwbclient0 | CVE-2020-25718 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25718.html
| +| libwbclient0 | CVE-2020-25719 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
https://linux.oracle.com/cve/CVE-2020-25719.html
https://linux.oracle.com/errata/ELSA-2021-5195.html
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25719.html
| +| libwbclient0 | CVE-2020-25721 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2021728
https://bugzilla.samba.org/show_bug.cgi?id=14725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25721.html
| +| libwbclient0 | CVE-2020-25722 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25722.html
| +| libwbclient0 | CVE-2021-23192 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
https://linux.oracle.com/cve/CVE-2021-23192.html
https://linux.oracle.com/errata/ELSA-2021-5082.html
https://ubuntu.com/security/CVE-2021-23192
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2021-23192.html
| +| libwbclient0 | CVE-2021-3738 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2021726
https://bugzilla.samba.org/show_bug.cgi?id=14468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2021-3738.html
| +| libwbclient0 | CVE-2022-0336 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
https://ubuntu.com/security/notices/USN-5260-1
https://www.samba.org/samba/security/CVE-2022-0336.html
| +| libwbclient0 | CVE-2021-3671 | LOW | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libwbclient0 | CVE-2021-43566 | LOW | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://bugzilla.samba.org/show_bug.cgi?id=13979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566
https://ubuntu.com/security/notices/USN-5260-1
https://www.samba.org/samba/history/
https://www.samba.org/samba/security/CVE-2021-43566.html
| +| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libxml-twig-perl | CVE-2016-9180 | LOW | 1:3.50-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00033.html
http://www.openwall.com/lists/oss-security/2016/11/02/1
http://www.openwall.com/lists/oss-security/2016/11/04/2
http://www.securityfocus.com/bid/94219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9180
| +| libxml2 | CVE-2022-23308 | MEDIUM | 2.9.10+dfsg-5ubuntu0.20.04.1 | 2.9.10+dfsg-5ubuntu0.20.04.2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://ubuntu.com/security/notices/USN-5324-1
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| libzmq3-dev | CVE-2020-15166 | MEDIUM | 4.3.2-2ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166
https://github.com/zeromq/libzmq/commit/e7f0090b161ce6344f6bd35009816a925c070b09
https://github.com/zeromq/libzmq/pull/3913
https://github.com/zeromq/libzmq/pull/3973
https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m
https://lists.debian.org/debian-lts-announce/2020/11/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ5IMNQXDB52JFBXHFLK4AHVORFELNNG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFW2ZELCCPS4VLU4OSJOH5YL6KFKTFYW/
https://security.gentoo.org/glsa/202009-12
https://www.openwall.com/lists/oss-security/2020/09/07/3
| +| libzmq3-dev | CVE-2021-20235 | MEDIUM | 4.3.2-2ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1921983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20235
https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6
| +| libzmq3-dev | CVE-2021-20236 | MEDIUM | 4.3.2-2ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1921976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236
https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8
| +| libzmq5 | CVE-2020-15166 | MEDIUM | 4.3.2-2ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166
https://github.com/zeromq/libzmq/commit/e7f0090b161ce6344f6bd35009816a925c070b09
https://github.com/zeromq/libzmq/pull/3913
https://github.com/zeromq/libzmq/pull/3973
https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m
https://lists.debian.org/debian-lts-announce/2020/11/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ5IMNQXDB52JFBXHFLK4AHVORFELNNG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFW2ZELCCPS4VLU4OSJOH5YL6KFKTFYW/
https://security.gentoo.org/glsa/202009-12
https://www.openwall.com/lists/oss-security/2020/09/07/3
| +| libzmq5 | CVE-2021-20235 | MEDIUM | 4.3.2-2ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1921983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20235
https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6
| +| libzmq5 | CVE-2021-20236 | MEDIUM | 4.3.2-2ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1921976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236
https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8
| +| linux-libc-dev | CVE-2021-33909 | HIGH | 5.4.0-77.86 | 5.4.0-80.90 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html
http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html
http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
http://www.openwall.com/lists/oss-security/2021/07/22/7
http://www.openwall.com/lists/oss-security/2021/08/25/10
http://www.openwall.com/lists/oss-security/2021/09/17/2
http://www.openwall.com/lists/oss-security/2021/09/17/4
http://www.openwall.com/lists/oss-security/2021/09/21/1
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b
https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b
https://linux.oracle.com/cve/CVE-2021-33909.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/
https://security.netapp.com/advisory/ntap-20210819-0004/
https://ubuntu.com/security/notices/USN-5014-1
https://ubuntu.com/security/notices/USN-5015-1
https://ubuntu.com/security/notices/USN-5016-1
https://ubuntu.com/security/notices/USN-5017-1
https://ubuntu.com/security/notices/USN-5018-1
https://www.debian.org/security/2021/dsa-4941
https://www.openwall.com/lists/oss-security/2021/07/20/1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt
| +| linux-libc-dev | CVE-2021-3653 | HIGH | 5.4.0-77.86 | 5.4.0-84.94 |
Expand...http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
https://bugzilla.redhat.com/show_bug.cgi?id=1983686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653
https://github.com/torvalds/linux/commit/3d6368ef580a
https://linux.oracle.com/cve/CVE-2021-3653.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://ubuntu.com/security/notices/USN-5062-1
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5072-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5082-1
https://www.openwall.com/lists/oss-security/2021/08/16/1
| +| linux-libc-dev | CVE-2021-3656 | HIGH | 5.4.0-77.86 | 5.4.0-84.94 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1983988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656
https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
https://github.com/torvalds/linux/commit/89c8a4984fc9
https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
https://linux.oracle.com/cve/CVE-2021-3656.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5072-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5082-1
https://www.openwall.com/lists/oss-security/2021/08/16/1
| +| linux-libc-dev | CVE-2021-4002 | HIGH | 5.4.0-77.86 | 5.4.0-92.103 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2025726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5206-1
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5211-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/11/25/1
| +| linux-libc-dev | CVE-2022-0001 | HIGH | 5.4.0-77.86 | 5.4.0-104.118 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2
https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://ubuntu.com/security/notices/USN-5319-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://www.vusec.net/projects/bhi-spectre-bhb/
| +| linux-libc-dev | CVE-2022-0002 | HIGH | 5.4.0-77.86 | 5.4.0-104.118 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2
https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://ubuntu.com/security/notices/USN-5319-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://www.vusec.net/projects/bhi-spectre-bhb/
| +| linux-libc-dev | CVE-2022-0185 | HIGH | 5.4.0-77.86 | 5.4.0-96.109 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de29310e8aa03fcbdb41fc92c521756
https://github.com/Crusaders-of-Rust/CVE-2022-0185
https://linux.oracle.com/cve/CVE-2022-0185.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://security.netapp.com/advisory/ntap-20220225-0003/
https://ubuntu.com/security/notices/USN-5240-1
https://www.openwall.com/lists/oss-security/2022/01/18/7
https://www.willsroot.io/2022/01/cve-2022-0185.html
| +| linux-libc-dev | CVE-2022-0492 | HIGH | 5.4.0-77.86 | 5.4.0-105.119 |
Expand...http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
https://bugzilla.redhat.com/show_bug.cgi?id=2051505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af
https://linux.oracle.com/cve/CVE-2022-0492.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2022/02/04/1
| +| linux-libc-dev | CVE-2022-23960 | HIGH | 5.4.0-77.86 | 5.4.0-104.118 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://developer.arm.com/documentation/ka004995/latest/
https://developer.arm.com/support/arm-security-updates
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb
https://linux.oracle.com/cve/CVE-2022-23960.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.vusec.net/projects/bhi-spectre-bhb/
| +| linux-libc-dev | CVE-2022-25636 | HIGH | 5.4.0-77.86 | 5.4.0-104.118 |
Expand...http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
http://www.openwall.com/lists/oss-security/2022/02/22/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636
https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6
https://github.com/Bonfee/CVE-2022-25636
https://linux.oracle.com/cve/CVE-2022-25636.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/
https://security.netapp.com/advisory/ntap-20220325-0002/
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://www.debian.org/security/2022/dsa-5095
https://www.openwall.com/lists/oss-security/2022/02/21/2
| +| linux-libc-dev | CVE-2013-7445 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| +| linux-libc-dev | CVE-2015-8553 | MEDIUM | 5.4.0-77.86 | |
Expand...http://thread.gmane.org/gmane.linux.kernel/1924087/focus=1930758 (regression mention)
http://xenbits.xen.org/xsa/advisory-120.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
https://seclists.org/bugtraq/2019/Aug/18
https://www.debian.org/security/2019/dsa-4497
| +| linux-libc-dev | CVE-2016-8660 | MEDIUM | 5.4.0-77.86 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| +| linux-libc-dev | CVE-2018-17977 | MEDIUM | 5.4.0-77.86 | |
Expand...http://www.securityfocus.com/bid/105539
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| +| linux-libc-dev | CVE-2020-12362 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362
https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-24504 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504
https://linux.oracle.com/cve/CVE-2020-24504.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
| +| linux-libc-dev | CVE-2020-26541 | MEDIUM | 5.4.0-77.86 | 5.4.0-92.103 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26541
https://linux.oracle.com/cve/CVE-2020-26541.html
https://linux.oracle.com/errata/ELSA-2021-2570.html
https://lkml.org/lkml/2020/9/15/1871
https://lore.kernel.org/lkml/161428671215.677100.6372209948022011988.stgit@warthog.procyon.org.uk/
https://lore.kernel.org/lkml/1884195.1615482306@warthog.procyon.org.uk/
https://lore.kernel.org/lkml/20200916004927.64276-1-eric.snowberg@oracle.com/
https://lore.kernel.org/lkml/20210122181054.32635-1-eric.snowberg@oracle.com/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5210-1
| +| linux-libc-dev | CVE-2020-26555 | MEDIUM | 5.4.0-77.86 | 5.4.0-80.90 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1918601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555
https://kb.cert.org/vuls/id/799380
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://ubuntu.com/security/notices/USN-5343-1
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
| +| linux-libc-dev | CVE-2020-26558 | MEDIUM | 5.4.0-77.86 | 5.4.0-80.90 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558
https://kb.cert.org/vuls/id/799380
https://linux.oracle.com/cve/CVE-2020-26558.html
https://linux.oracle.com/errata/ELSA-2021-4432.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://ubuntu.com/security/notices/USN-4989-1
https://ubuntu.com/security/notices/USN-4989-2
https://ubuntu.com/security/notices/USN-5017-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/passkey-entry/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
| +| linux-libc-dev | CVE-2020-27835 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1901709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835
https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79
https://linux.oracle.com/cve/CVE-2020-27835.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://ubuntu.com/security/notices/USN-4751-1
| +| linux-libc-dev | CVE-2020-36310 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
https://linux.oracle.com/cve/CVE-2020-36310.html
https://linux.oracle.com/errata/ELSA-2021-9307.html
https://www.debian.org/security/2022/dsa-5095
| +| linux-libc-dev | CVE-2020-36311 | MEDIUM | 5.4.0-77.86 | 5.4.0-84.94 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36311
https://git.kernel.org/linus/7be74942f184fdfba34ddd19a0d995deb34d4a03
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7be74942f184fdfba34ddd19a0d995deb34d4a03
https://linux.oracle.com/cve/CVE-2020-36311.html
https://linux.oracle.com/errata/ELSA-2021-9451.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5120-1
| +| linux-libc-dev | CVE-2020-36385 | MEDIUM | 5.4.0-77.86 | 5.4.0-90.101 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385
https://git.kernel.org/linus/f5449e74802c1112dea984aec8af7a33c4516af1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1
https://linux.oracle.com/cve/CVE-2020-36385.html
https://linux.oracle.com/errata/ELSA-2021-4777.html
https://security.netapp.com/advisory/ntap-20210720-0004/
https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-ucma_close-2
https://syzkaller.appspot.com/bug?id=457491c4672d7b52c1007db213d93e47c711fae6
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://ubuntu.com/security/notices/USN-5343-1
| +| linux-libc-dev | CVE-2020-3702 | MEDIUM | 5.4.0-77.86 | 5.4.0-89.100 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/linux-wireless/CABvG-CVvPF++0vuGzCrBj8+s=Bcx1GwWfiW1_Somu_GVncTAcQ@mail.gmail.com/
https://lore.kernel.org/stable/20210818084859.vcs4vs3yd6zetmyt@pali/t/#mf8b430d4f19f1b939a29b6c5098fdc514fd1a928
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58
https://www.debian.org/security/2021/dsa-4978
https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
| +| linux-libc-dev | CVE-2021-0129 | MEDIUM | 5.4.0-77.86 | 5.4.0-80.90 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f
https://linux.oracle.com/cve/CVE-2021-0129.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html
https://security.netapp.com/advisory/ntap-20210716-0002/
https://ubuntu.com/security/notices/USN-5017-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4951
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html
| +| linux-libc-dev | CVE-2021-0920 | MEDIUM | 5.4.0-77.86 | 5.4.0-88.99 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920
https://git.kernel.org/linus/cbcf01128d0a92e131bd09f1688fe032480b65ca
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca
https://linux.oracle.com/cve/CVE-2021-0920.html
https://linux.oracle.com/errata/ELSA-2022-9014.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://source.android.com/security/bulletin/2021-11-01
| +| linux-libc-dev | CVE-2021-20320 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2010090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320
https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/
| +| linux-libc-dev | CVE-2021-20321 | MEDIUM | 5.4.0-77.86 | 5.4.0-92.103 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)
https://linux.oracle.com/cve/CVE-2021-20321.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-20322 | MEDIUM | 5.4.0-77.86 | 5.4.0-92.103 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2014230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://security.netapp.com/advisory/ntap-20220303-0002/
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-22543 | MEDIUM | 5.4.0-77.86 | 5.4.0-84.94 |
Expand...http://www.openwall.com/lists/oss-security/2021/06/26/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543
https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584
https://github.com/torvalds/linux/commit/f8be156be163a052a067306417cd0ff679068c97
https://linux.oracle.com/cve/CVE-2021-22543.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/
https://security.netapp.com/advisory/ntap-20210708-0002/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5071-3
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://www.openwall.com/lists/oss-security/2021/05/26/3
https://www.openwall.com/lists/oss-security/2021/05/26/4
https://www.openwall.com/lists/oss-security/2021/05/26/5
| +| linux-libc-dev | CVE-2021-22600 | MEDIUM | 5.4.0-77.86 | 5.4.0-100.113 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5266-1
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5298-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-26932 | MEDIUM | 5.4.0-77.86 | |
Expand...http://xenbits.xen.org/xsa/advisory-361.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26932
https://linux.oracle.com/cve/CVE-2021-26932.html
https://linux.oracle.com/errata/ELSA-2021-9136.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/3
https://xenbits.xen.org/xsa/advisory-361.html
| +| linux-libc-dev | CVE-2021-28714 | MEDIUM | 5.4.0-77.86 | 5.4.0-105.119 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-392.html
https://xenbits.xenproject.org/xsa/advisory-392.txt
| +| linux-libc-dev | CVE-2021-28715 | MEDIUM | 5.4.0-77.86 | 5.4.0-105.119 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-392.html
https://xenbits.xenproject.org/xsa/advisory-392.txt
| +| linux-libc-dev | CVE-2021-33098 | MEDIUM | 5.4.0-77.86 | 5.4.0-80.90 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33098
https://security.netapp.com/advisory/ntap-20211210-0005/
https://ubuntu.com/security/notices/USN-5343-1
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html
| +| linux-libc-dev | CVE-2021-33624 | MEDIUM | 5.4.0-77.86 | 5.4.0-88.99 |
Expand...http://www.openwall.com/lists/oss-security/2021/06/21/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9183671af6dbf60a1219371d4ed73e23f43b49db
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=973377ffe8148180b2651825b92ae91988141b05
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d203b0fd863a2261e5d00b97f3d060c4c2a6db71
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fe9a5ca7e370e613a9a75a13008a3845ea759d6e
https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5115-1
https://www.openwall.com/lists/oss-security/2021/06/21/1
https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner
| +| linux-libc-dev | CVE-2021-34556 | MEDIUM | 5.4.0-77.86 | 5.4.0-90.101 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/01/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/08/01/3
| +| linux-libc-dev | CVE-2021-35477 | MEDIUM | 5.4.0-77.86 | 5.4.0-90.101 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/08/01/3
| +| linux-libc-dev | CVE-2021-3564 | MEDIUM | 5.4.0-77.86 | 5.4.0-81.91 |
Expand...http://www.openwall.com/lists/oss-security/2021/05/25/1
http://www.openwall.com/lists/oss-security/2021/06/01/2
https://bugzilla.redhat.com/show_bug.cgi?id=1964139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564
https://linux.oracle.com/cve/CVE-2021-3564.html
https://linux.oracle.com/errata/ELSA-2022-0620.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-bluetooth/20210525123902.189012-1-gregkh@linuxfoundation.org/
https://ubuntu.com/security/notices/USN-5015-1
https://ubuntu.com/security/notices/USN-5044-1
https://ubuntu.com/security/notices/USN-5045-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2021/05/25/1
| +| linux-libc-dev | CVE-2021-3573 | MEDIUM | 5.4.0-77.86 | 5.4.0-81.91 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1966578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52
https://linux.oracle.com/cve/CVE-2021-3573.html
https://linux.oracle.com/errata/ELSA-2022-0620.html
https://ubuntu.com/security/notices/USN-5015-1
https://ubuntu.com/security/notices/USN-5044-1
https://ubuntu.com/security/notices/USN-5045-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2021/06/08/2
| +| linux-libc-dev | CVE-2021-3612 | MEDIUM | 5.4.0-77.86 | 5.4.0-84.94 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1974079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612
https://linux.oracle.com/cve/CVE-2021-3612.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/
https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/
https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/T/#u
https://security.netapp.com/advisory/ntap-20210805-0005/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5071-3
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5073-3
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
| +| linux-libc-dev | CVE-2021-3640 | MEDIUM | 5.4.0-77.86 | 5.4.0-97.110 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://linux.oracle.com/cve/CVE-2021-3640.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lkml.org/lkml/2021/8/28/238
https://ubuntu.com/security/CVE-2021-3640
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/07/22/1
https://x-lore.kernel.org/all/15f5a46.b79d9.17ba6802ccd.Coremail.linma@zju.edu.cn/
https://x-lore.kernel.org/all/20210810041410.142035-1-desmondcheongzx@gmail.com/
https://x-lore.kernel.org/all/20210828161818.31141-1-tiwai@suse.de/
| +| linux-libc-dev | CVE-2021-3655 | MEDIUM | 5.4.0-77.86 | 5.4.0-91.102 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1984024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f9beb95e6a2669fa35e34a6ff52808b181efa20f
https://linux.oracle.com/cve/CVE-2021-3655.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/netdev/599e6c1fdcc50f16597380118c9b3b6790241d50.1627439903.git.marcelo.leitner@gmail.com/
https://lore.kernel.org/netdev/e39b372644b6e5bf48df25e54b9172f34ec223a1.1624904195.git.marcelo.leitner@gmail.com/T/
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
| +| linux-libc-dev | CVE-2021-3732 | MEDIUM | 5.4.0-77.86 | 5.4.0-89.100 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1995249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3732
https://git.kernel.org/linus/427215d85e8d1476da1a86b8d67aceb485eb3631
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631
https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631
https://linux.oracle.com/cve/CVE-2021-3732.html
https://linux.oracle.com/errata/ELSA-2021-9577.html
https://ubuntu.com/security/CVE-2021-3732
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
| +| linux-libc-dev | CVE-2021-3743 | MEDIUM | 5.4.0-77.86 | 5.4.0-90.101 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1997961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3743
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=194ccc88297ae78d0803adad83c6dcc369787c9e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e78c597c3ebfd0cb329aa09a838734147e4f117
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad9d24c9429e2159d1e279dc3a83191ccb4daf1d
https://github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117
https://linux.oracle.com/cve/CVE-2021-3743.html
https://linux.oracle.com/errata/ELSA-2021-9475.html
https://lists.openwall.net/netdev/2021/08/17/124
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/08/27/2
| +| linux-libc-dev | CVE-2021-3752 | MEDIUM | 5.4.0-77.86 | 5.4.0-97.110 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1999544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
https://linux.oracle.com/cve/CVE-2021-3752.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/
https://security.netapp.com/advisory/ntap-20220318-0009/
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/09/15/4
| +| linux-libc-dev | CVE-2021-3753 | MEDIUM | 5.4.0-77.86 | 5.4.0-90.101 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1999589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753
https://git.kernel.org/linus/2287a51ba822384834dafc1c798453375d1107c7
https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7
https://linux.oracle.com/cve/CVE-2021-3753.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/09/01/4
| +| linux-libc-dev | CVE-2021-37576 | MEDIUM | 5.4.0-77.86 | 5.4.0-88.99 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/27/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576
https://git.kernel.org/linus/f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a (5.14-rc3)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a
https://linux.oracle.com/cve/CVE-2021-37576.html
https://linux.oracle.com/errata/ELSA-2021-3801.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/
https://lore.kernel.org/linuxppc-dev/87im0x1lqi.fsf@mpe.ellerman.id.au/T/#u
https://security.netapp.com/advisory/ntap-20210917-0005/
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://www.debian.org/security/2021/dsa-4978
https://www.openwall.com/lists/oss-security/2021/07/26/1
| +| linux-libc-dev | CVE-2021-3759 | MEDIUM | 5.4.0-77.86 | 5.4.0-90.101 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759
https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5135-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2021-3760 | MEDIUM | 5.4.0-77.86 | 5.4.0-92.103 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2000585
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://security.netapp.com/advisory/ntap-20220318-0007/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/10/26/2
| +| linux-libc-dev | CVE-2021-3764 | MEDIUM | 5.4.0-77.86 | 5.4.0-91.102 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
| +| linux-libc-dev | CVE-2021-38160 | MEDIUM | 5.4.0-77.86 | 5.4.0-88.99 |
Expand...https://access.redhat.com/security/cve/cve-2021-38160
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160
https://git.kernel.org/linus/d00d8da5869a2608e97cfede094dfc5e11462a46
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d00d8da5869a2608e97cfede094dfc5e11462a46
https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46
https://linux.oracle.com/cve/CVE-2021-38160.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://security.netapp.com/advisory/ntap-20210902-0010/
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5073-3
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4978
| +| linux-libc-dev | CVE-2021-38198 | MEDIUM | 5.4.0-77.86 | 5.4.0-89.100 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198
https://github.com/torvalds/linux/commit/b1bd5cba3306691c771d558e94baa73e8b0b96b7
https://linux.oracle.com/cve/CVE-2021-38198.html
https://linux.oracle.com/errata/ELSA-2021-9475.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5343-1
| +| linux-libc-dev | CVE-2021-38199 | MEDIUM | 5.4.0-77.86 | 5.4.0-88.99 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38199
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dd99e9f98fbf423ff6d365b37a98e8879170f17c
https://github.com/torvalds/linux/commit/dd99e9f98fbf423ff6d365b37a98e8879170f17c
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://security.netapp.com/advisory/ntap-20210902-0010/
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://www.debian.org/security/2021/dsa-4978
| +| linux-libc-dev | CVE-2021-38207 | MEDIUM | 5.4.0-77.86 | 5.4.0-81.91 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38207
https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d
https://security.netapp.com/advisory/ntap-20210902-0007/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5120-1
| +| linux-libc-dev | CVE-2021-38208 | MEDIUM | 5.4.0-77.86 | 5.4.0-81.91 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/17/1
http://www.openwall.com/lists/oss-security/2021/08/17/2
http://www.openwall.com/lists/oss-security/2021/08/24/2
https://bugzilla.redhat.com/show_bug.cgi?id=1992810
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38208
https://github.com/torvalds/linux/commit/4ac06a1e013cf5fdd963317ffd3b968560f33bba
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5343-1
| +| linux-libc-dev | CVE-2021-3864 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864
https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
https://www.openwall.com/lists/oss-security/2021/10/20/2
| +| linux-libc-dev | CVE-2021-39633 | MEDIUM | 5.4.0-77.86 | 5.4.0-90.101 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39633
https://git.kernel.org/linus/1d011c4803c72f3907eccfc1ec63caefb852fcbf (5.14)
https://source.android.com/security/bulletin/2022-01-01
| +| linux-libc-dev | CVE-2021-39685 | MEDIUM | 5.4.0-77.86 | 5.4.0-100.113 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=36dfdf11af49d3c009c711fb16f5c6e7a274505d
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=6eea4ace62fa6414432692ee44f0c0a3d541d97a
https://github.com/szymonh/inspector-gadget
https://gitlab.com/postmarketOS/pmaports/-/issues/1346
https://linux.oracle.com/cve/CVE-2021-39685.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://source.android.com/security/bulletin/2022-03-01
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://www.openwall.com/lists/oss-security/2021/12/15/4
| +| linux-libc-dev | CVE-2021-4001 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2025645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4001
https://git.kernel.org/linus/353050be4c19e102178ccc05988101887c25ae53
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5278-1
| +| linux-libc-dev | CVE-2021-4037 | MEDIUM | 5.4.0-77.86 | 5.4.0-92.103 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
| +| linux-libc-dev | CVE-2021-40490 | MEDIUM | 5.4.0-77.86 | 5.4.0-89.100 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa
https://linux.oracle.com/cve/CVE-2021-40490.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/
https://lore.kernel.org/linux-ext4/000000000000e5080305c9e51453@google.com/
https://security.netapp.com/advisory/ntap-20211004-0001/
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4978
| +| linux-libc-dev | CVE-2021-4083 | MEDIUM | 5.4.0-77.86 | 5.4.0-100.113 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2029923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
https://git.kernel.org/linus/054aa8d439b9185d4f5eb9a90282d1ce74772969 (5.16-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://security.netapp.com/advisory/ntap-20220217-0005/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-4135 | MEDIUM | 5.4.0-77.86 | 5.4.0-105.119 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
https://git.kernel.org/linus/481221775d53d6215a6e5e9ce1cce6d2b4ab9a46 (5.16-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=481221775d53
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
| +| linux-libc-dev | CVE-2021-4148 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2026487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148
https://lkml.org/lkml/2021/9/12/323
https://lkml.org/lkml/2021/9/17/1037
https://lore.kernel.org/linux-mm/a07564a3-b2fc-9ffe-3ace-3f276075ea5c@google.com/
https://lore.kernel.org/lkml/CACkBjsYwLYLRmX8GpsDpMthagWOjWWrNxqY6ZLNQVr6yx+f5vA@mail.gmail.com/
https://lore.kernel.org/lkml/CAHbLzkrdGva2dzO36r62LKv_ip5trbMK0BO3vCeSBk2_7OE-zA@mail.gmail.com/
| +| linux-libc-dev | CVE-2021-4149 | MEDIUM | 5.4.0-77.86 | 5.4.0-92.103 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2026485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149
https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)
https://lkml.org/lkml/2021/10/18/885
https://lkml.org/lkml/2021/9/13/2565
| +| linux-libc-dev | CVE-2021-4150 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2025938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4150
https://git.kernel.org/linus/9fbfabfda25d8774c5a08634fdd2da000a924890 (5.15-rc7)
https://lkml.org/lkml/2021/10/18/485
https://lkml.org/lkml/2021/9/6/781
| +| linux-libc-dev | CVE-2021-4154 | MEDIUM | 5.4.0-77.86 | 5.4.0-88.99 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2034514
https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4154
https://git.kernel.org/linus/3b0462726e7ef281c35a7a4ae33e93ee2bc9975b (5.14-rc2)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b
https://linux.oracle.com/cve/CVE-2021-4154.html
https://linux.oracle.com/errata/ELSA-2022-0825.html
https://security.netapp.com/advisory/ntap-20220225-0004/
| +| linux-libc-dev | CVE-2021-4155 | MEDIUM | 5.4.0-77.86 | 5.4.0-100.113 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
https://git.kernel.org/linus/983d8e60f50806f90534cc5373d0ce867e5aaf79 (5.16)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79
https://linux.oracle.com/cve/CVE-2021-4155.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://www.openwall.com/lists/oss-security/2022/01/10/1
| +| linux-libc-dev | CVE-2021-4157 | MEDIUM | 5.4.0-77.86 | 5.4.0-80.90 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2034342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4157
https://git.kernel.org/linus/ed34695e15aba74f45247f1ee2cf7e09d449f925 (5.13-rc1)
https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/
| +| linux-libc-dev | CVE-2021-4159 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159
| +| linux-libc-dev | CVE-2021-4197 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2035652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
| +| linux-libc-dev | CVE-2021-4202 | MEDIUM | 5.4.0-77.86 | 5.4.0-100.113 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2036682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
| +| linux-libc-dev | CVE-2021-4203 | MEDIUM | 5.4.0-77.86 | 5.4.0-91.102 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2230
https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1
https://bugzilla.redhat.com/show_bug.cgi?id=2036934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
https://git.kernel.org/linus/35306eb23814444bd4021f8a1c3047d3cb0c8b2b (5.15-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814
https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/
| +| linux-libc-dev | CVE-2021-4218 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4218
| +| linux-libc-dev | CVE-2021-42252 | MEDIUM | 5.4.0-77.86 | 5.4.0-90.101 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42252
https://git.kernel.org/linus/b49a0e69a7b1a68c8d3f64097d06dabb770fec96 (5.15-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b49a0e69a7b1a68c8d3f64097d06dabb770fec96
https://security.netapp.com/advisory/ntap-20211112-0006/
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
| +| linux-libc-dev | CVE-2021-42739 | MEDIUM | 5.4.0-77.86 | 5.4.0-97.110 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e
https://linux.oracle.com/cve/CVE-2021-42739.html
https://linux.oracle.com/errata/ELSA-2022-0063.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EHZNHNHRLPC2NJKUDS5PJG5AGRYJVJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOWGMZ2MJFUGNA5QSD5JF4QHIC4URATS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKMQEOEESIO3GMHAOL3NYS36FER6UTWA/
https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/
https://seclists.org/oss-sec/2021/q2/46
https://security.netapp.com/advisory/ntap-20211118-0001/
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5266-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-43056 | MEDIUM | 5.4.0-77.86 | 5.4.0-92.103 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/28/1
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 (5.15-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AA7EAPPKWG4LMTQQLNNSKATY6ST2KQFE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBM4FP3IT3JZ2O7EBS7TEOG657N4ZGRE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRAIS3PG4EV5WFLYESR6FXWM4BJJGWVA/
https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf@mpe.ellerman.id.au/T/#u
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
| +| linux-libc-dev | CVE-2021-43975 | MEDIUM | 5.4.0-77.86 | 5.4.0-100.113 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/
https://security.netapp.com/advisory/ntap-20211210-0001/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5337-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-44733 | MEDIUM | 5.4.0-77.86 | 5.4.0-105.119 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2030747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/tee/tee_shm.c
https://github.com/pjlantz/optee-qemu/blob/main/README.md
https://linux.oracle.com/cve/CVE-2021-44733.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/
https://lore.kernel.org/lkml/20211215092501.1861229-1-jens.wiklander@linaro.org/
https://security.netapp.com/advisory/ntap-20220114-0003/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-44879 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.kernel.org/show_bug.cgi?id=215231
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f
https://lkml.org/lkml/2022/1/24/4067
https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/
https://ubuntu.com/security/notices/USN-5302-1
https://www.openwall.com/lists/oss-security/2022/02/12/1
| +| linux-libc-dev | CVE-2021-45095 | MEDIUM | 5.4.0-77.86 | 5.4.0-105.119 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0
https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/20211209082839.33985-1-hbh25y@gmail.com/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-45469 | MEDIUM | 5.4.0-77.86 | |
Expand...http://www.openwall.com/lists/oss-security/2021/12/25/1
https://bugzilla.kernel.org/show_bug.cgi?id=215235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=dev&id=5598b24efaf4892741c798b425d543e4bed357a1
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AK2C4A43BZSWATZWFUHHHUQF3HPIALNP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QG7XV2WXKMSMKIQKIBG5LW3Y3GXEWG5Q/
https://security.netapp.com/advisory/ntap-20220114-0003/
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-45480 | MEDIUM | 5.4.0-77.86 | 5.4.0-105.119 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
https://git.kernel.org/linus/5f9562ebe710c307adc5f666bf1a2162ee7977c0
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f9562ebe710c307adc5f666bf1a2162ee7977c0
https://github.com/torvalds/linux/commit/5f9562ebe710c307adc5f666bf1a2162ee7977c0
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-45485 | MEDIUM | 5.4.0-77.86 | 5.4.0-84.94 |
Expand...https://arxiv.org/pdf/2112.09604.pdf
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485
https://git.kernel.org/linus/62f20e068ccc50d6ab66fdb72ba90da2b9418c99 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99
https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/
https://security.netapp.com/advisory/ntap-20220121-0001/
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
| +| linux-libc-dev | CVE-2022-0322 | MEDIUM | 5.4.0-77.86 | 5.4.0-92.103 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2042822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
https://git.kernel.org/linus/a2d859e3fc97e79d907761550dbc03ff1b36479c (5.15-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c
| +| linux-libc-dev | CVE-2022-0330 | MEDIUM | 5.4.0-77.86 | 5.4.0-100.113 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2042404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c
https://linux.oracle.com/cve/CVE-2022-0330.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://www.openwall.com/lists/oss-security/2022/01/25/12
| +| linux-libc-dev | CVE-2022-0382 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0382
https://github.com/torvalds/linux/commit/d6d86830705f173fca6087a3e67ceaf68db80523
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
| +| linux-libc-dev | CVE-2022-0400 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2040604
https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public)
https://bugzilla.redhat.com/show_bug.cgi?id=2044575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400
| +| linux-libc-dev | CVE-2022-0435 | MEDIUM | 5.4.0-77.86 | 5.4.0-105.119 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2048738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
https://linux.oracle.com/cve/CVE-2022-0435.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://www.openwall.com/lists/oss-security/2022/02/10/1
| +| linux-libc-dev | CVE-2022-0480 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2049700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480
https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)
https://github.com/kata-containers/kata-containers/issues/3373
https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
| +| linux-libc-dev | CVE-2022-0487 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2044561
https://bugzilla.suse.com/show_bug.cgi?id=1194516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd2db32e7c3e35bd4d9b8bbff689434a50893546
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/
https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-0500 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2044578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57
| +| linux-libc-dev | CVE-2022-0516 | MEDIUM | 5.4.0-77.86 | 5.4.0-105.119 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2050237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55
https://linux.oracle.com/cve/CVE-2022-0516.html
https://linux.oracle.com/errata/ELSA-2022-0825.html
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://www.debian.org/security/2022/dsa-5092
https://www.openwall.com/lists/oss-security/2022/02/11/2
| +| linux-libc-dev | CVE-2022-0850 | MEDIUM | 5.4.0-77.86 | 5.4.0-84.94 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2060606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe
https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8
| +| linux-libc-dev | CVE-2022-0998 | MEDIUM | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-0998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0998
https://git.kernel.org/linus/870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0 (5.17-rc1)
https://lore.kernel.org/netdev/20220123001216.2460383-13-sashal@kernel.org/
| +| linux-libc-dev | CVE-2022-22942 | MEDIUM | 5.4.0-77.86 | 5.4.0-100.113 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
https://linux.oracle.com/cve/CVE-2022-22942.html
https://linux.oracle.com/errata/ELSA-2022-0825.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://www.openwall.com/lists/oss-security/2022/01/27/4
| +| linux-libc-dev | CVE-2022-23036 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23037 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23038 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23039 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23040 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23041 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23042 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-24958 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda
https://github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74
https://github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
https://security.netapp.com/advisory/ntap-20220225-0008/
| +| linux-libc-dev | CVE-2022-25258 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
https://github.com/szymonh/d-os-descriptor
https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-25375 | MEDIUM | 5.4.0-77.86 | |
Expand...http://www.openwall.com/lists/oss-security/2022/02/21/1
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
https://git.kernel.org/linus/38ea1eac7d88072bbffb630e2b3db83ca649b826 (5.17-rc4)
https://github.com/szymonh/rndis-co
https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-26490 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
https://git.kernel.org/linux/4fbcc1a4cb20fe26ad0225679c536c80f1648221 (5.17-rc1)
https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
| +| linux-libc-dev | CVE-2022-26966 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26966
https://git.kernel.org/linus/e9da0b56fe27206b49f39805f7dcda8a89379062 (5.17-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062
| +| linux-libc-dev | CVE-2022-27223 | MEDIUM | 5.4.0-77.86 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27223
https://git.kernel.org/linus/7f14c7227f342d9932f9b918893c8814f86d2a0d (5.17-rc6)
https://github.com/torvalds/linux/commit/7f14c7227f342d9932f9b918893c8814f86d2a0d
| +| linux-libc-dev | CVE-2017-0537 | LOW | 5.4.0-77.86 | |
Expand...http://www.securityfocus.com/bid/96831
http://www.securitytracker.com/id/1037968
https://android.googlesource.com/kernel/tegra.git/+/389b185cb2f17fff994dbdf8d4bac003d4b2b6b3%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0537
https://lore.kernel.org/lkml/1484647168-30135-1-git-send-email-jilin@nvidia.com/#t
https://source.android.com/security/bulletin/2017-01-01.html
https://source.android.com/security/bulletin/2017-03-01
https://source.android.com/security/bulletin/2017-03-01.html
| +| linux-libc-dev | CVE-2017-13165 | LOW | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13165
https://github.com/aosp-mirror/platform_system_core/commit/15ffc53f6d57a46e3041453865311035a18e047a
https://source.android.com/security/bulletin/pixel/2017-12-01
| +| linux-libc-dev | CVE-2017-13693 | LOW | 5.4.0-77.86 | |
Expand...http://www.securityfocus.com/bid/100502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| +| linux-libc-dev | CVE-2018-1121 | LOW | 5.4.0-77.86 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| linux-libc-dev | CVE-2018-12928 | LOW | 5.4.0-77.86 | |
Expand...http://www.securityfocus.com/bid/104593
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
| +| linux-libc-dev | CVE-2018-12929 | LOW | 5.4.0-77.86 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12929
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| +| linux-libc-dev | CVE-2018-12930 | LOW | 5.4.0-77.86 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12930
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| +| linux-libc-dev | CVE-2018-12931 | LOW | 5.4.0-77.86 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12931
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| +| linux-libc-dev | CVE-2019-14899 | LOW | 5.4.0-77.86 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Jul/23
http://seclists.org/fulldisclosure/2020/Jul/24
http://seclists.org/fulldisclosure/2020/Jul/25
http://seclists.org/fulldisclosure/2020/Nov/20
http://www.openwall.com/lists/oss-security/2020/08/13/2
http://www.openwall.com/lists/oss-security/2020/10/07/3
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14899
https://openvpn.net/security-advisory/no-flaws-found-in-openvpn-software/
https://support.apple.com/kb/HT211288
https://support.apple.com/kb/HT211289
https://support.apple.com/kb/HT211290
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://www.openwall.com/lists/oss-security/2019/12/05/1
| +| linux-libc-dev | CVE-2019-15213 | LOW | 5.4.0-77.86 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| +| linux-libc-dev | CVE-2019-16230 | LOW | 5.4.0-77.86 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| linux-libc-dev | CVE-2019-19378 | LOW | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2019-19449 | LOW | 5.4.0-77.86 | 5.4.0-90.101 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://ubuntu.com/security/notices/USN-5343-1
| +| linux-libc-dev | CVE-2019-19814 | LOW | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2020-11725 | LOW | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://twitter.com/yabbadabbadrew/status/1248632267028582400
| +| linux-libc-dev | CVE-2020-12363 | LOW | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-12364 | LOW | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-14304 | LOW | 5.4.0-77.86 | |
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| +| linux-libc-dev | CVE-2020-27820 | LOW | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1901726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820
https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201125202648.5220-1-jcline@redhat.com/
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5278-1
| +| linux-libc-dev | CVE-2020-35501 | LOW | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://www.openwall.com/lists/oss-security/2021/02/18/1
| +| linux-libc-dev | CVE-2021-26934 | LOW | 5.4.0-77.86 | |
Expand...http://xenbits.xen.org/xsa/advisory-363.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/2
https://xenbits.xen.org/xsa/advisory-363.html
| +| linux-libc-dev | CVE-2021-28711 | LOW | 5.4.0-77.86 | 5.4.0-105.119 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
| +| linux-libc-dev | CVE-2021-28712 | LOW | 5.4.0-77.86 | 5.4.0-105.119 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
| +| linux-libc-dev | CVE-2021-28713 | LOW | 5.4.0-77.86 | 5.4.0-105.119 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
| +| linux-libc-dev | CVE-2021-32078 | LOW | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://security.netapp.com/advisory/ntap-20210813-0002/
| +| linux-libc-dev | CVE-2021-3428 | LOW | 5.4.0-77.86 | 5.4.0-90.101 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1972621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3428
https://linux.oracle.com/cve/CVE-2021-3428.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://ubuntu.com/security/CVE-2021-3428
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/03/17/1
https://www.openwall.com/lists/oss-security/2021/03/17/13
https://www.openwall.com/lists/oss-security/2021/03/17/5
| +| linux-libc-dev | CVE-2021-34693 | LOW | 5.4.0-77.86 | 5.4.0-81.91 |
Expand...http://www.openwall.com/lists/oss-security/2021/06/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693
https://linux.oracle.com/cve/CVE-2021-34693.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html
https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/
https://ubuntu.com/security/notices/USN-5045-1
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5073-3
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4941
https://www.openwall.com/lists/oss-security/2021/06/15/1
| +| linux-libc-dev | CVE-2021-34981 | LOW | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981
https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479
https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
| +| linux-libc-dev | CVE-2021-3669 | LOW | 5.4.0-77.86 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| +| linux-libc-dev | CVE-2021-3679 | LOW | 5.4.0-77.86 | 5.4.0-88.99 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1989165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3679
https://git.kernel.org/linus/67f0d6d9883c13174669f88adac4f0ee656cc16a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a
https://linux.oracle.com/cve/CVE-2021-3679.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4978
| +| linux-libc-dev | CVE-2021-37159 | LOW | 5.4.0-77.86 | 5.4.0-91.102 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159
https://linux.oracle.com/cve/CVE-2021-37159.html
https://linux.oracle.com/errata/ELSA-2021-9475.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/linux-usb/20201002114323.GA3296553@kroah.com/
https://security.netapp.com/advisory/ntap-20210819-0003/
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
https://www.spinics.net/lists/linux-usb/msg202228.html
| +| linux-libc-dev | CVE-2021-3739 | LOW | 5.4.0-77.86 | 5.4.0-90.101 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1997958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3739
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091
https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091
https://linux.oracle.com/cve/CVE-2021-3739.html
https://linux.oracle.com/errata/ELSA-2021-9475.html
https://lore.kernel.org/linux-btrfs/20210806102415.304717-1-wqu@suse.com/T/#u
https://ubuntu.com/security/CVE-2021-3739
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/08/25/3
| +| linux-libc-dev | CVE-2021-3744 | LOW | 5.4.0-77.86 | 5.4.0-91.102 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2000627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680
https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0
https://linux.oracle.com/cve/CVE-2021-3744.html
https://linux.oracle.com/errata/ELSA-2021-9565.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://seclists.org/oss-sec/2021/q3/164
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-3772 | LOW | 5.4.0-77.86 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2000694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/CVE-2021-3772
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5265-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-38204 | LOW | 5.4.0-77.86 | 5.4.0-88.99 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38204
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5fdf5c6e6bee35837e160c00ac89327bdad031b
https://github.com/torvalds/linux/commit/b5fdf5c6e6bee35837e160c00ac89327bdad031b
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
| +| linux-libc-dev | CVE-2021-38205 | LOW | 5.4.0-77.86 | 5.4.0-89.100 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38205
https://github.com/torvalds/linux/commit/d0d62baa7f505bd4c59cd169692ff07ec49dde37
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
| +| linux-libc-dev | CVE-2021-41864 | LOW | 5.4.0-77.86 | 5.4.0-92.103 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a
https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a
https://linux.oracle.com/cve/CVE-2021-41864.html
https://linux.oracle.com/errata/ELSA-2021-9623.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://security.netapp.com/advisory/ntap-20211029-0004/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-42008 | LOW | 5.4.0-77.86 | 5.4.0-89.100 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42008
https://git.kernel.org/linus/19d1532a187669ce86d5a2696eb7275310070793 (5.14-rc7)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://security.netapp.com/advisory/ntap-20211104-0002/
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.youtube.com/watch?v=d5f9xLK8Vhw
| +| linux-libc-dev | CVE-2021-43389 | LOW | 5.4.0-77.86 | 5.4.0-92.103 |
Expand...http://www.openwall.com/lists/oss-security/2021/11/05/1
https://bugzilla.redhat.com/show_bug.cgi?id=2013180
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/
https://seclists.org/oss-sec/2021/q4/39
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/10/19/1
| +| linux-libc-dev | CVE-2021-43976 | LOW | 5.4.0-77.86 | 5.4.0-105.119 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
https://security.netapp.com/advisory/ntap-20211210-0001/
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
| +| locales | CVE-2021-3999 | MEDIUM | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2019-25013 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2020-27618 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2020-29562 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2020-6096 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2021-3326 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2021-35942 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2022-23218 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2022-23219 | LOW | 2.31-0ubuntu9.2 | 2.31-0ubuntu9.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| mount | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| mount | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| openssh-client | CVE-2021-36368 | MEDIUM | 1:8.2p1-4ubuntu0.2 | |
Expand...https://bugzilla.mindrot.org/show_bug.cgi?id=3316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368
https://docs.ssh-mitm.at/trivialauth.html
https://github.com/openssh/openssh-portable/pull/258
https://www.openssh.com/security.html
| +| openssh-client | CVE-2020-14145 | LOW | 1:8.2p1-4ubuntu0.2 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
| +| openssh-client | CVE-2021-41617 | LOW | 1:8.2p1-4ubuntu0.2 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| openssh-server | CVE-2021-36368 | MEDIUM | 1:8.2p1-4ubuntu0.2 | |
Expand...https://bugzilla.mindrot.org/show_bug.cgi?id=3316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368
https://docs.ssh-mitm.at/trivialauth.html
https://github.com/openssh/openssh-portable/pull/258
https://www.openssh.com/security.html
| +| openssh-server | CVE-2020-14145 | LOW | 1:8.2p1-4ubuntu0.2 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
| +| openssh-server | CVE-2021-41617 | LOW | 1:8.2p1-4ubuntu0.2 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| openssh-sftp-server | CVE-2021-36368 | MEDIUM | 1:8.2p1-4ubuntu0.2 | |
Expand...https://bugzilla.mindrot.org/show_bug.cgi?id=3316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368
https://docs.ssh-mitm.at/trivialauth.html
https://github.com/openssh/openssh-portable/pull/258
https://www.openssh.com/security.html
| +| openssh-sftp-server | CVE-2020-14145 | LOW | 1:8.2p1-4ubuntu0.2 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
| +| openssh-sftp-server | CVE-2021-41617 | LOW | 1:8.2p1-4ubuntu0.2 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| openssl | CVE-2021-3711 | HIGH | 1.1.1f-1ubuntu2.4 | 1.1.1f-1ubuntu2.8 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| openssl | CVE-2022-0778 | HIGH | 1.1.1f-1ubuntu2.4 | 1.1.1f-1ubuntu2.12 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9246.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| openssl | CVE-2021-3712 | MEDIUM | 1.1.1f-1ubuntu2.4 | 1.1.1f-1ubuntu2.8 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| patch | CVE-2018-6952 | LOW | 2.7.6-6 | |
Expand...http://www.securityfocus.com/bid/103047
https://access.redhat.com/errata/RHSA-2019:2033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952
https://linux.oracle.com/cve/CVE-2018-6952.html
https://linux.oracle.com/errata/ELSA-2019-2033.html
https://savannah.gnu.org/bugs/index.php?53133
https://security.gentoo.org/glsa/201904-17
| +| patch | CVE-2021-45261 | LOW | 2.7.6-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261
https://savannah.gnu.org/bugs/?61685
| +| perl | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-modules-5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| policykit-1 | CVE-2021-4034 | HIGH | 0.105-26ubuntu1.1 | 0.105-26ubuntu1.2 |
Expand...http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html
http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html
https://access.redhat.com/security/vulnerabilities/RHSB-2022-001
https://bugzilla.redhat.com/show_bug.cgi?id=2025869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034
https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
https://linux.oracle.com/cve/CVE-2021-4034.html
https://linux.oracle.com/errata/ELSA-2022-9073.html
https://ubuntu.com/security/notices/USN-5252-1
https://ubuntu.com/security/notices/USN-5252-2
https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
| +| policykit-1 | CVE-2021-4115 | MEDIUM | 0.105-26ubuntu1.1 | 0.105-26ubuntu1.3 |
Expand...https://access.redhat.com/security/cve/cve-2021-4115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115
https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e
https://gitlab.freedesktop.org/polkit/polkit/-/issues/141
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/
https://securitylab.github.com/advisories/GHSL-2021-077-polkit/
https://ubuntu.com/security/notices/USN-5304-1
| +| policykit-1 | CVE-2016-2568 | LOW | 0.105-26ubuntu1.1 | |
Expand...http://seclists.org/oss-sec/2016/q1/443
http://www.openwall.com/lists/oss-security/2016/02/26/3
https://access.redhat.com/security/cve/cve-2016-2568
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062
https://bugzilla.redhat.com/show_bug.cgi?id=1300746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2568
https://lore.kernel.org/patchwork/patch/793178/
https://ubuntu.com/security/CVE-2016-2568
| +| python3-urllib3 | CVE-2021-33503 | LOW | 1.25.8-2ubuntu0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503
https://github.com/advisories/GHSA-q2q7-5pp4-w6pg
https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec
https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg
https://linux.oracle.com/cve/CVE-2021-33503.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/
https://nvd.nist.gov/vuln/detail/CVE-2021-33503
https://security.gentoo.org/glsa/202107-36
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.8 | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 |
Expand...https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.8 | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.2 |
Expand...https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| python3.8 | CVE-2022-0391 | MEDIUM | 3.8.10-0ubuntu1~20.04 | |
Expand...https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://security.netapp.com/advisory/ntap-20220225-0009/
| +| python3.8-minimal | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 |
Expand...https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.8-minimal | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.2 |
Expand...https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| python3.8-minimal | CVE-2022-0391 | MEDIUM | 3.8.10-0ubuntu1~20.04 | |
Expand...https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://security.netapp.com/advisory/ntap-20220225-0009/
| +| samba-libs | CVE-2021-44142 | HIGH | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://bugzilla.samba.org/show_bug.cgi?id=14914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
https://kb.cert.org/vuls/id/119678
https://linux.oracle.com/cve/CVE-2021-44142.html
https://linux.oracle.com/errata/ELSA-2022-0332.html
https://ubuntu.com/security/notices/USN-5260-1
https://ubuntu.com/security/notices/USN-5260-2
https://ubuntu.com/security/notices/USN-5260-3
https://www.samba.org/samba/security/CVE-2021-44142.html
https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin
| +| samba-libs | CVE-2016-2124 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
https://linux.oracle.com/cve/CVE-2016-2124.html
https://linux.oracle.com/errata/ELSA-2021-5192.html
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2016-2124.html
| +| samba-libs | CVE-2020-25717 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
https://linux.oracle.com/cve/CVE-2020-25717.html
https://linux.oracle.com/errata/ELSA-2021-5192.html
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25717.html
| +| samba-libs | CVE-2020-25718 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25718.html
| +| samba-libs | CVE-2020-25719 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
https://linux.oracle.com/cve/CVE-2020-25719.html
https://linux.oracle.com/errata/ELSA-2021-5195.html
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25719.html
| +| samba-libs | CVE-2020-25721 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2021728
https://bugzilla.samba.org/show_bug.cgi?id=14725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25721.html
| +| samba-libs | CVE-2020-25722 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2020-25722.html
| +| samba-libs | CVE-2021-23192 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
https://linux.oracle.com/cve/CVE-2021-23192.html
https://linux.oracle.com/errata/ELSA-2021-5082.html
https://ubuntu.com/security/CVE-2021-23192
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2021-23192.html
| +| samba-libs | CVE-2021-3738 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2021726
https://bugzilla.samba.org/show_bug.cgi?id=14468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
https://ubuntu.com/security/notices/USN-5142-1
https://www.samba.org/samba/history/samba-4.13.14.html
https://www.samba.org/samba/security/CVE-2021-3738.html
| +| samba-libs | CVE-2022-0336 | MEDIUM | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
https://ubuntu.com/security/notices/USN-5260-1
https://www.samba.org/samba/security/CVE-2022-0336.html
| +| samba-libs | CVE-2021-3671 | LOW | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.14+dfsg-0ubuntu0.20.04.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| samba-libs | CVE-2021-43566 | LOW | 2:4.11.6+dfsg-0ubuntu1.9 | 2:4.13.17~dfsg-0ubuntu0.21.04.1 |
Expand...https://bugzilla.samba.org/show_bug.cgi?id=13979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43566
https://ubuntu.com/security/notices/USN-5260-1
https://www.samba.org/samba/history/
https://www.samba.org/samba/security/CVE-2021-43566.html
| +| sqlite3 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| +| sqlite3 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| +| sqlite3 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| +| sqlite3 | CVE-2021-36690 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| subversion | CVE-2018-11803 | MEDIUM | 1.13.0-3 | |
Expand...http://www.securityfocus.com/bid/106770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11803
https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003@%3Cdev.subversion.apache.org%3E
https://security.gentoo.org/glsa/201904-08
https://subversion.apache.org/security/CVE-2018-11803-advisory.txt
https://ubuntu.com/security/notices/USN-3869-1
https://usn.ubuntu.com/3869-1/
| +| subversion | CVE-2020-17525 | MEDIUM | 1.13.0-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525
https://linux.oracle.com/cve/CVE-2020-17525.html
https://linux.oracle.com/errata/ELSA-2021-0507.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html
https://subversion.apache.org/security/CVE-2020-17525-advisory.txt
https://ubuntu.com/security/notices/USN-5322-1
| +| sysstat | CVE-2019-16167 | LOW | 12.2.0-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00067.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00068.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16167
https://github.com/sysstat/sysstat/compare/v12.1.5...v12.1.6
https://github.com/sysstat/sysstat/issues/230
https://linux.oracle.com/cve/CVE-2019-16167.html
https://linux.oracle.com/errata/ELSA-2020-4638.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RVSMKUPWIGQYX4G5LZXL7ZBJN3KY6RM3/
https://ubuntu.com/security/notices/USN-4242-1
https://usn.ubuntu.com/4242-1/
| +| systemd | CVE-2021-33910 | HIGH | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
| +| systemd | CVE-2021-3997 | MEDIUM | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.15 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| systemd | CVE-2020-13529 | LOW | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| systemd-sysv | CVE-2021-33910 | HIGH | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
| +| systemd-sysv | CVE-2021-3997 | MEDIUM | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.15 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| systemd-sysv | CVE-2020-13529 | LOW | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| systemd-timesyncd | CVE-2021-33910 | HIGH | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
| +| systemd-timesyncd | CVE-2021-3997 | MEDIUM | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.15 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| systemd-timesyncd | CVE-2020-13529 | LOW | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-7ubuntu0.20.04.1 | 1.30+dfsg-7ubuntu0.20.04.2 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| udev | CVE-2021-33910 | HIGH | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
| +| udev | CVE-2021-3997 | MEDIUM | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.15 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| udev | CVE-2020-13529 | LOW | 245.4-4ubuntu3.7 | 245.4-4ubuntu3.10 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| udisks2 | CVE-2021-3802 | LOW | 2.8.4-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3802
https://bugzilla.redhat.com/show_bug.cgi?id=2003649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3802
https://github.com/storaged-project/udisks/releases/tag/udisks-2.9.4
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt
| +| unzip | CVE-2022-0529 | MEDIUM | 6.0-25ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529
https://github.com/ByteHackr/unzip_poc
| +| unzip | CVE-2021-4217 | LOW | 6.0-25ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217
| +| unzip | CVE-2022-0530 | LOW | 6.0-25ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530
https://github.com/ByteHackr/unzip_poc
| +| util-linux | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| util-linux | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| uuid-dev | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| uuid-dev | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| vim | CVE-2021-3770 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770
https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e
https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim | CVE-2021-3778 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778
https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
https://linux.oracle.com/cve/CVE-2021-3778.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim | CVE-2021-3796 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796
https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
https://linux.oracle.com/cve/CVE-2021-3796.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim | CVE-2021-3872 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
https://linux.oracle.com/cve/CVE-2021-3872.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim | CVE-2021-3927 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927
https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim | CVE-2021-3928 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928
https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim | CVE-2021-3984 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
https://linux.oracle.com/cve/CVE-2021-3984.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim | CVE-2021-4019 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://linux.oracle.com/cve/CVE-2021-4019.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim | CVE-2021-4069 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| vim | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
| +| vim | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim | CVE-2021-3903 | LOW | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim | CVE-2021-3974 | LOW | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-common | CVE-2021-3770 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770
https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e
https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-common | CVE-2021-3778 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778
https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
https://linux.oracle.com/cve/CVE-2021-3778.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-common | CVE-2021-3796 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796
https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
https://linux.oracle.com/cve/CVE-2021-3796.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-common | CVE-2021-3872 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
https://linux.oracle.com/cve/CVE-2021-3872.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-common | CVE-2021-3927 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927
https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-common | CVE-2021-3928 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928
https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-common | CVE-2021-3984 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
https://linux.oracle.com/cve/CVE-2021-3984.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-common | CVE-2021-4019 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://linux.oracle.com/cve/CVE-2021-4019.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-common | CVE-2021-4069 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-common | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| vim-common | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
| +| vim-common | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-common | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-common | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-common | CVE-2021-3903 | LOW | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-common | CVE-2021-3974 | LOW | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-runtime | CVE-2021-3770 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770
https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e
https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-runtime | CVE-2021-3778 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778
https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
https://linux.oracle.com/cve/CVE-2021-3778.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-runtime | CVE-2021-3796 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796
https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
https://linux.oracle.com/cve/CVE-2021-3796.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-runtime | CVE-2021-3872 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
https://linux.oracle.com/cve/CVE-2021-3872.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-runtime | CVE-2021-3927 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927
https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-runtime | CVE-2021-3928 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928
https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-runtime | CVE-2021-3984 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
https://linux.oracle.com/cve/CVE-2021-3984.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-runtime | CVE-2021-4019 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://linux.oracle.com/cve/CVE-2021-4019.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-runtime | CVE-2021-4069 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-runtime | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| vim-runtime | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
| +| vim-runtime | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-runtime | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-runtime | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-runtime | CVE-2021-3903 | LOW | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-runtime | CVE-2021-3974 | LOW | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://ubuntu.com/security/notices/USN-5247-1
| +| wget | CVE-2021-31879 | MEDIUM | 1.20.3-1ubuntu1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879
https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
https://savannah.gnu.org/bugs/?56909
https://security.netapp.com/advisory/ntap-20210618-0002/
| +| x11-common | CVE-2012-1093 | LOW | 1:7.7+19ubuntu14 | |
Expand...http://vladz.devzero.fr/012_x11-common-vuln.html
http://www.openwall.com/lists/oss-security/2012/02/29/1
http://www.openwall.com/lists/oss-security/2012/03/01/1
https://access.redhat.com/security/cve/cve-2012-1093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1093
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2012-1093
| +| xxd | CVE-2021-3770 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770
https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e
https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/
https://ubuntu.com/security/notices/USN-5093-1
| +| xxd | CVE-2021-3778 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778
https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
https://linux.oracle.com/cve/CVE-2021-3778.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| xxd | CVE-2021-3796 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.3 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796
https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
https://linux.oracle.com/cve/CVE-2021-3796.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| xxd | CVE-2021-3872 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
https://linux.oracle.com/cve/CVE-2021-3872.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://ubuntu.com/security/notices/USN-5147-1
| +| xxd | CVE-2021-3927 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927
https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| xxd | CVE-2021-3928 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928
https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| xxd | CVE-2021-3984 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
https://linux.oracle.com/cve/CVE-2021-3984.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| xxd | CVE-2021-4019 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://linux.oracle.com/cve/CVE-2021-4019.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| xxd | CVE-2021-4069 | MEDIUM | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/
https://ubuntu.com/security/notices/USN-5247-1
| +| xxd | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| xxd | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
| +| xxd | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| xxd | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| xxd | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| xxd | CVE-2021-3903 | LOW | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.4 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5147-1
| +| xxd | CVE-2021-3974 | LOW | 2:8.1.2269-1ubuntu5 | 2:8.1.2269-1ubuntu5.6 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://ubuntu.com/security/notices/USN-5247-1
| +| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-2ubuntu1.2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://www.openwall.com/lists/oss-security/2022/03/24/1
| +| zlib1g-dev | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-2ubuntu1.2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://www.openwall.com/lists/oss-security/2022/03/24/1
| +| zsh | CVE-2021-45444 | LOW | 5.8-3ubuntu1 | 5.8-3ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45444
https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P3LPMGENEHKDWFO4MWMZSZL6G7Y4CV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/
https://sourceforge.net/p/zsh/code/ci/bdc4d70a7e033b754e68a8659a037ea0fc5f38de/
https://sourceforge.net/p/zsh/code/ci/c187154f47697cdbf822c2f9d714d570ed4a0fd1/
https://sourceforge.net/p/zsh/code/ci/fdb8b0ce6244ff26bf55e0fd825310a58d0d3156/
https://ubuntu.com/security/notices/USN-5325-1
https://vuln.ryotak.me/advisories/63
https://www.debian.org/security/2022/dsa-5078
https://www.zsh.org/mla/announce/msg00133.html
https://zsh.sourceforge.io/releases.html
| +| zsh-common | CVE-2021-45444 | LOW | 5.8-3ubuntu1 | 5.8-3ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45444
https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P3LPMGENEHKDWFO4MWMZSZL6G7Y4CV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/
https://sourceforge.net/p/zsh/code/ci/bdc4d70a7e033b754e68a8659a037ea0fc5f38de/
https://sourceforge.net/p/zsh/code/ci/c187154f47697cdbf822c2f9d714d570ed4a0fd1/
https://sourceforge.net/p/zsh/code/ci/fdb8b0ce6244ff26bf55e0fd825310a58d0d3156/
https://ubuntu.com/security/notices/USN-5325-1
https://vuln.ryotak.me/advisories/63
https://www.debian.org/security/2022/dsa-5078
https://www.zsh.org/mla/announce/msg00133.html
https://zsh.sourceforge.io/releases.html
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**node-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| @npmcli/arborist | CVE-2021-39134 | HIGH | 2.6.4 | 2.8.2 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-2h3h-q99f-3fhc
https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc
https://nvd.nist.gov/vuln/detail/CVE-2021-39134
https://www.npmjs.com/package/@npmcli/arborist
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| @npmcli/arborist | CVE-2021-39135 | HIGH | 2.6.4 | 2.8.2 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-gmw6-94gg-2rc2
https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2
https://nvd.nist.gov/vuln/detail/CVE-2021-39135
https://www.npmjs.com/package/@npmcli/arborist
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| ansi-regex | CVE-2021-3807 | HIGH | 5.0.0 | 4.1.1, 5.0.1, 6.0.1 |
Expand...https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
| +| code-server | CVE-2021-3810 | HIGH | 3.10.2 | 3.12.0 |
Expand...https://github.com/advisories/GHSA-49x3-8228-3w3m
https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5
https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223
https://nvd.nist.gov/vuln/detail/CVE-2021-3810
| +| engine.io | CVE-2022-21676 | HIGH | 5.1.1 | 6.1.1, 5.2.1, 4.1.2 |
Expand...https://github.com/advisories/GHSA-273r-mgr4-v34f
https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab
https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db
https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c
https://github.com/socketio/engine.io/releases/tag/4.1.2
https://github.com/socketio/engine.io/releases/tag/5.2.1
https://github.com/socketio/engine.io/releases/tag/6.1.1
https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f
https://nvd.nist.gov/vuln/detail/CVE-2022-21676
| +| follow-redirects | CVE-2022-0155 | MEDIUM | 1.14.1 | 1.14.7 |
Expand...https://github.com/advisories/GHSA-74fj-2j2h-c42q
https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22
https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406
https://nvd.nist.gov/vuln/detail/CVE-2022-0155
| +| follow-redirects | CVE-2022-0536 | MEDIUM | 1.14.1 | 1.14.8 |
Expand...https://github.com/advisories/GHSA-pw2r-vq6v-hr8c
https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445
https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db
https://nvd.nist.gov/vuln/detail/CVE-2022-0536
| +| grunt | CVE-2020-7729 | HIGH | 1.0.0 | 1.3.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7729
https://github.com/advisories/GHSA-m5pj-vjjf-4m3h
https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249
https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7
https://lists.debian.org/debian-lts-announce/2020/09/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2020-7729
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922
https://snyk.io/vuln/SNYK-JS-GRUNT-597546
https://ubuntu.com/security/notices/USN-4595-1
https://usn.ubuntu.com/4595-1/
| +| handlebars | CVE-2019-19919 | CRITICAL | 1.0.0 | 4.3.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19919
https://github.com/advisories/GHSA-w457-6q6x-cgp9
https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc
https://github.com/wycats/handlebars.js/issues/1558
https://nvd.nist.gov/vuln/detail/CVE-2019-19919
https://www.npmjs.com/advisories/1164
| +| handlebars | CVE-2021-23369 | CRITICAL | 1.0.0 | 4.7.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23369
https://github.com/advisories/GHSA-f2jv-r9rf-7988
https://github.com/handlebars-lang/handlebars.js/commit/b6d3de7123eebba603e321f04afdbae608e8fea8
https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427
https://nvd.nist.gov/vuln/detail/CVE-2021-23369
https://security.netapp.com/advisory/ntap-20210604-0008/
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074951
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952
https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767
| +| handlebars | CVE-2021-23383 | CRITICAL | 1.0.0 | 4.7.7 |
Expand...https://github.com/advisories/GHSA-765h-qjxv-5f44
https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427
https://nvd.nist.gov/vuln/detail/CVE-2021-23383
https://security.netapp.com/advisory/ntap-20210618-0007/
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030
https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029
https://www.npmjs.com/package/handlebars
| +| handlebars | CVE-2019-20920 | HIGH | 1.0.0 | 4.5.3, 3.0.8 |
Expand...https://github.com/advisories/GHSA-3cqr-58rm-57f8
https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e
https://nvd.nist.gov/vuln/detail/CVE-2019-20920
https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478
https://www.npmjs.com/advisories/1316
https://www.npmjs.com/advisories/1324
https://www.npmjs.com/package/handlebars
| +| handlebars | GHSA-2cf5-4w76-r9qv | HIGH | 1.0.0 | 4.5.2, 3.0.8 |
Expand...https://github.com/advisories/GHSA-2cf5-4w76-r9qv
https://www.npmjs.com/advisories/1316
| +| handlebars | GHSA-g9r4-xpmj-mj65 | HIGH | 1.0.0 | 4.5.3, 3.0.8 |
Expand...https://github.com/advisories/GHSA-g9r4-xpmj-mj65
https://www.npmjs.com/advisories/1325
| +| handlebars | GHSA-q2c6-c6pm-g3gh | HIGH | 1.0.0 | 4.5.3, 3.0.8 |
Expand...https://github.com/advisories/GHSA-q2c6-c6pm-g3gh
https://www.npmjs.com/advisories/1324
| +| handlebars | GHSA-q42p-pg8m-cqh6 | HIGH | 1.0.0 | 3.0.7, 4.0.14, 4.1.2 |
Expand...https://github.com/advisories/GHSA-q42p-pg8m-cqh6
https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86
https://github.com/handlebars-lang/handlebars.js/issues/1495
https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692
https://www.npmjs.com/advisories/755
| +| handlebars | CVE-2015-8861 | MEDIUM | 1.0.0 | >=4.0.0 |
Expand...http://www.openwall.com/lists/oss-security/2016/04/20/11
http://www.securityfocus.com/bid/96434
https://blog.srcclr.com/handlebars_vulnerability_research_findings/
https://github.com/advisories/GHSA-9prh-257w-9277
https://github.com/wycats/handlebars.js/pull/1083
https://nvd.nist.gov/vuln/detail/CVE-2015-8861
https://www.npmjs.com/advisories/61
https://www.sourceclear.com/blog/handlebars_vulnerability_research_findings/
https://www.tenable.com/security/tns-2016-18
| +| handlebars | NSWG-ECO-519 | MEDIUM | 1.0.0 | >=4.6.0 |
Expand...https://hackerone.com/reports/726364
| +| ini | CVE-2020-7788 | HIGH | 1.0.0 | 1.3.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788
https://github.com/advisories/GHSA-qqgx-2p2h-9c37
https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1
https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 (v1.3.6)
https://linux.oracle.com/cve/CVE-2020-7788.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2020-7788
https://snyk.io/vuln/SNYK-JS-INI-1048974
https://www.npmjs.com/advisories/1589
| +| jquery-ui | CVE-2021-41182 | MEDIUM | 1.12.1 | 1.13.0 |
Expand...https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/
https://github.com/advisories/GHSA-9gj3-hwp5-pmwc
https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63
https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc
https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/
https://nvd.nist.gov/vuln/detail/CVE-2021-41182
https://security.netapp.com/advisory/ntap-20211118-0004/
https://www.drupal.org/sa-contrib-2022-004
https://www.drupal.org/sa-core-2022-002
| +| jquery-ui | CVE-2021-41183 | MEDIUM | 1.12.1 | 1.13.0 |
Expand...https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/
https://bugs.jqueryui.com/ticket/15284
https://github.com/advisories/GHSA-j7qv-pgf6-hvh4
https://github.com/jquery/jquery-ui/pull/1953
https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4
https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/
https://nvd.nist.gov/vuln/detail/CVE-2021-41183
https://security.netapp.com/advisory/ntap-20211118-0004/
https://www.drupal.org/sa-contrib-2022-004
https://www.drupal.org/sa-core-2022-001
https://www.drupal.org/sa-core-2022-002
| +| jquery-ui | CVE-2021-41184 | MEDIUM | 1.12.1 | 1.13.0 |
Expand...https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/
https://github.com/advisories/GHSA-gpqq-952q-5327
https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280
https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/
https://nvd.nist.gov/vuln/detail/CVE-2021-41184
https://security.netapp.com/advisory/ntap-20211118-0004/
https://www.drupal.org/sa-core-2022-001
| +| json | CVE-2020-7712 | HIGH | 1.0.0 | 10.0.0 |
Expand...https://github.com/advisories/GHSA-3c6g-pvg8-gqw2
https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483
https://github.com/trentm/json/issues/144
https://github.com/trentm/json/pull/145
https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r977a907ecbedf87ae5ba47d4c77639efb120f74d4d1b3de14a4ef4da@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r9c6d28e5b9a9b3481b7d1f90f1c2f75cd1a5ade91038426e0fb095da@%3Cdev.flink.apache.org%3E
https://lists.apache.org/thread.html/ra890c24b3d90be36daf48ae76b263acb297003db24c1122f8e4aaef2@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rba7ea4d75d6a8e5b935991d960d9b893fd30e576c4d3b531084ebd7d@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-7712
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-608932
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931
https://snyk.io/vuln/SNYK-JS-JSON-597481
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| markdown | GHSA-wx77-rp39-c6vg | LOW | 1.0.0 | |
Expand...https://github.com/advisories/GHSA-wx77-rp39-c6vg
https://www.npmjs.com/advisories/1330
| +| minimist | CVE-2021-44906 | CRITICAL | 1.2.5 | 1.2.6 |
Expand...https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip
https://github.com/advisories/GHSA-xvch-5gv4-984h
https://github.com/substack/minimist/blob/master/index.js#L69
https://github.com/substack/minimist/issues/164
https://nvd.nist.gov/vuln/detail/CVE-2021-44906
https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068
| +| nbdime-jupyterlab | CVE-2021-41134 | MEDIUM | 2.1.0 | 2.1.1, 1.0.1 |
Expand...https://github.com/advisories/GHSA-p6rw-44q7-3fw4
https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea
https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4
https://nvd.nist.gov/vuln/detail/CVE-2021-41134
| +| node-fetch | CVE-2022-0235 | MEDIUM | 2.6.1 | 2.6.7, 3.1.1 |
Expand...https://github.com/advisories/GHSA-r683-j2x4-v87g
https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10
https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60
https://github.com/node-fetch/node-fetch/pull/1453
https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7
https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/
https://nvd.nist.gov/vuln/detail/CVE-2022-0235
| +| npm | CVE-2016-3956 | HIGH | 1.0.1 | >= 2.15.1 <= 3.0.0, >= 3.8.3 |
Expand...http://blog.npmjs.org/post/142036323955/fixing-a-bearer-token-vulnerability
http://www-01.ibm.com/support/docview.wss?uid=swg21980827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3956
https://github.com/advisories/GHSA-m5h6-hr3q-22h5
https://github.com/npm/npm/commit/f67ecad59e99a03e5aad8e93cd1a086ae087cb29
https://github.com/npm/npm/commit/fea8cc92cee02c720b58f95f14d315507ccad401
https://github.com/npm/npm/issues/8380
https://nodejs.org/en/blog/vulnerability/npm-tokens-leak-march-2016/
https://nodesecurity.io/advisories/98
https://nvd.nist.gov/vuln/detail/CVE-2016-3956
https://www.npmjs.com/advisories/98
| +| npm | CVE-2019-16776 | HIGH | 1.0.1 | 6.13.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html
https://access.redhat.com/errata/RHEA-2020:0330
https://access.redhat.com/errata/RHSA-2020:0573
https://access.redhat.com/errata/RHSA-2020:0579
https://access.redhat.com/errata/RHSA-2020:0597
https://access.redhat.com/errata/RHSA-2020:0602
https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli
https://github.com/advisories/GHSA-x8qc-rrcw-4r46
https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46
https://linux.oracle.com/cve/CVE-2019-16776.html
https://linux.oracle.com/errata/ELSA-2020-0579.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/
https://nvd.nist.gov/vuln/detail/CVE-2019-16776
https://www.npmjs.com/advisories/1436
https://www.oracle.com/security-alerts/cpujan2020.html
| +| npm | CVE-2019-16775 | MEDIUM | 1.0.1 | 6.13.3 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html
https://access.redhat.com/errata/RHEA-2020:0330
https://access.redhat.com/errata/RHSA-2020:0573
https://access.redhat.com/errata/RHSA-2020:0579
https://access.redhat.com/errata/RHSA-2020:0597
https://access.redhat.com/errata/RHSA-2020:0602
https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli
https://github.com/advisories/GHSA-m6cx-g6qm-p2cx
https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx
https://linux.oracle.com/cve/CVE-2019-16775.html
https://linux.oracle.com/errata/ELSA-2020-0579.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/
https://nvd.nist.gov/vuln/detail/CVE-2019-16775
https://www.npmjs.com/advisories/1434
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| npm | CVE-2019-16777 | MEDIUM | 1.0.1 | 6.13.4 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html
https://access.redhat.com/errata/RHEA-2020:0330
https://access.redhat.com/errata/RHSA-2020:0573
https://access.redhat.com/errata/RHSA-2020:0579
https://access.redhat.com/errata/RHSA-2020:0597
https://access.redhat.com/errata/RHSA-2020:0602
https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli
https://github.com/advisories/GHSA-4328-8hgf-7wjr
https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr
https://linux.oracle.com/cve/CVE-2019-16777.html
https://linux.oracle.com/errata/ELSA-2020-0579.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/
https://nvd.nist.gov/vuln/detail/CVE-2019-16777
https://security.gentoo.org/glsa/202003-48
https://www.npmjs.com/advisories/1437
https://www.oracle.com/security-alerts/cpujan2020.html
| +| npm | CVE-2020-15095 | MEDIUM | 1.0.1 | 6.14.6 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html
https://github.com/advisories/GHSA-93f3-23rq-pjfp
https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07
https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc
https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp
https://linux.oracle.com/cve/CVE-2020-15095.html
https://linux.oracle.com/errata/ELSA-2021-0548.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://nvd.nist.gov/vuln/detail/CVE-2020-15095
https://security.gentoo.org/glsa/202101-07
| +| npm | CVE-2013-4116 | LOW | 1.0.1 | >=1.3.3 |
Expand...http://www.openwall.com/lists/oss-security/2013/07/10/17
http://www.openwall.com/lists/oss-security/2013/07/11/9
http://www.securityfocus.com/bid/61083
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715325
https://bugzilla.redhat.com/show_bug.cgi?id=983917
https://exchange.xforce.ibmcloud.com/vulnerabilities/87141
https://github.com/advisories/GHSA-v3jv-wrf4-5845
https://github.com/npm/npm/commit/f4d31693
https://github.com/npm/npm/issues/3635
https://nvd.nist.gov/vuln/detail/CVE-2013-4116
https://www.npmjs.com/advisories/152
| +| pac-resolver | CVE-2021-23406 | CRITICAL | 4.2.0 | 5.0.0 |
Expand...Upstream patches:
https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e
https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5
https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0
https://github.com/advisories/GHSA-9j49-mfvp-vmhm
https://nvd.nist.gov/vuln/detail/CVE-2021-23406
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506
https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857
| +| pug | CVE-2021-21353 | CRITICAL | 1.0.0 | 3.0.1 |
Expand...https://github.com/advisories/GHSA-p493-635q-r6gr
https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0
https://github.com/pugjs/pug/issues/3312
https://github.com/pugjs/pug/pull/3314
https://github.com/pugjs/pug/releases/tag/pug%403.0.1
https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr
https://nvd.nist.gov/vuln/detail/CVE-2021-21353
https://www.npmjs.com/package/pug
https://www.npmjs.com/package/pug-code-gen
| +| tar | CVE-2021-32803 | HIGH | 6.1.0 | 6.1.2, 5.0.7, 4.4.15, 3.2.3 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-r628-mhmh-qjhw
https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20
https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw
https://linux.oracle.com/cve/CVE-2021-32803.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32803
https://www.npmjs.com/advisories/1771
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-32804 | HIGH | 6.1.0 | 6.1.1, 5.0.6, 4.4.14, 3.2.2 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-3jfq-g458-7qm9
https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4
https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9
https://linux.oracle.com/cve/CVE-2021-32804.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32804
https://www.npmjs.com/advisories/1770
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-37701 | HIGH | 6.1.0 | 6.1.7, 5.0.8, 4.4.16 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-9r2w-394v-53qc
https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc
https://linux.oracle.com/cve/CVE-2021-37701.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-37701
https://www.debian.org/security/2021/dsa-5008
https://www.npmjs.com/advisories/1779
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-37712 | HIGH | 6.1.0 | 6.1.9, 5.0.10, 4.4.18 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-qq89-hq3f-393p
https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p
https://linux.oracle.com/cve/CVE-2021-37712.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-37712
https://www.debian.org/security/2021/dsa-5008
https://www.npmjs.com/advisories/1780
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-37713 | HIGH | 6.1.0 | 6.1.9, 5.0.10, 4.4.18 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-5955-9wpr-37jh
https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh
https://nvd.nist.gov/vuln/detail/CVE-2021-37713
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tree-kill | CVE-2019-15599 | CRITICAL | 1.2.0 | >=1.2.2 |
Expand...https://hackerone.com/reports/701183
| +| tree-kill | GHSA-884p-74jh-xrg2 | HIGH | 1.2.0 | 1.2.2 |
Expand...https://github.com/advisories/GHSA-884p-74jh-xrg2
https://hackerone.com/reports/701183
https://www.npmjs.com/advisories/1432
| + +**python-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| Glances | CVE-2021-23418 | CRITICAL | 3.1.7 | 3.2.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23418
https://github.com/advisories/GHSA-r2mj-8wgq-73m6
https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94
https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a
https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32
https://github.com/nicolargo/glances/issues/1025
https://nvd.nist.gov/vuln/detail/CVE-2021-23418
https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807
| +| Glances | CVE-2020-24025 | MEDIUM | 3.1.7 | 3.2.4 |
Expand...https://github.com/advisories/GHSA-r8f7-9pfq-mjmv
https://github.com/sass/node-sass/issues/3067
https://github.com/sass/node-sass/pull/567#issuecomment-656609236
https://nvd.nist.gov/vuln/detail/CVE-2020-24025
| +| Glances | pyup.io-40900 | UNKNOWN | 3.1.7 | 3.2.0 |
Expand...
| +| Keras | CVE-2021-37678 | HIGH | 2.4.3 | 2.6.0rc3 |
Expand...https://github.com/advisories/GHSA-r6jx-9g48-2r5r
https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6jx-9g48-2r5r
https://nvd.nist.gov/vuln/detail/CVE-2021-37678
| +| Pillow | CVE-2021-34552 | CRITICAL | 8.2.0 | 8.3.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34552
https://github.com/advisories/GHSA-7534-mm45-c74v
https://github.com/python-pillow/Pillow/pull/5567
https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-34552
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
https://pillow.readthedocs.io/en/stable/releasenotes/index.html
https://ubuntu.com/security/notices/USN-5227-1
https://ubuntu.com/security/notices/USN-5227-2
| +| Pillow | CVE-2022-22815 | CRITICAL | 8.2.0 | 9.0.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22815
https://github.com/advisories/GHSA-pw3c-h7wp-cvhx
https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
https://github.com/python-pillow/Pillow/commit/c48271ab354db49cdbd740bc45e13be4f0f7993c
https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22815
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
https://ubuntu.com/security/notices/USN-5227-1
https://ubuntu.com/security/notices/USN-5227-2
https://www.debian.org/security/2022/dsa-5053
| +| Pillow | CVE-2022-22817 | CRITICAL | 8.2.0 | 9.0.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22817
https://github.com/advisories/GHSA-8vj2-vxx3-667w
https://github.com/python-pillow/Pillow/commit/8531b01d6cdf0b70f256f93092caa2a5d91afc11
https://linux.oracle.com/cve/CVE-2022-22817.html
https://linux.oracle.com/errata/ELSA-2022-0643.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22817
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security
https://ubuntu.com/security/notices/USN-5227-1
https://ubuntu.com/security/notices/USN-5227-2
https://www.debian.org/security/2022/dsa-5053
| +| Pillow | CVE-2021-23437 | HIGH | 8.2.0 | 8.3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23437
https://github.com/advisories/GHSA-98vv-pw6r-q6q4
https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/
https://nvd.nist.gov/vuln/detail/CVE-2021-23437
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html
https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443
https://ubuntu.com/security/notices/USN-5227-1
https://ubuntu.com/security/notices/USN-5227-2
| +| Pillow | CVE-2022-22816 | MEDIUM | 8.2.0 | 9.0.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22816
https://github.com/advisories/GHSA-xrcv-f9gm-v42c
https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
https://linux.oracle.com/cve/CVE-2022-22816.html
https://linux.oracle.com/errata/ELSA-2022-0643.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22816
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
https://ubuntu.com/security/notices/USN-5227-1
https://ubuntu.com/security/notices/USN-5227-2
https://www.debian.org/security/2022/dsa-5053
| +| Pillow | CVE-2022-24303 | MEDIUM | 8.2.0 | 9.0.1 |
Expand...https://github.com/advisories/GHSA-9j59-75qj-795w
https://github.com/python-pillow/Pillow/commit/427221ef5f19157001bf8b1ad7cfe0b905ca8c26
https://nvd.nist.gov/vuln/detail/CVE-2022-24303
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security
| +| Pillow | GHSA-4fx9-vc88-q2xc | LOW | 8.2.0 | 9.0.0 |
Expand...https://github.com/advisories/GHSA-4fx9-vc88-q2xc
https://github.com/python-pillow/Pillow/commit/baae9ec4b67c68e3adaf1208cf54e8de5e38a6fd
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#ensure-jpegimageplugin-stops-at-the-end-of-a-truncated-file
| +| Pillow | pyup.io-44524 | UNKNOWN | 8.2.0 | 9.0.0 |
Expand...
| +| Pillow | pyup.io-44525 | UNKNOWN | 8.2.0 | 9.0.0 |
Expand...
| +| Scrapy | CVE-2021-41125 | MEDIUM | 2.5.0 | 1.8.1, 2.5.1 |
Expand...http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41125
https://github.com/advisories/GHSA-jwqp-28gf-p498
https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6
https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498
https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-41125
https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header
| +| Scrapy | CVE-2022-0577 | MEDIUM | 2.5.0 | 2.6.0, 1.8.2 |
Expand...https://github.com/advisories/GHSA-cjvr-mfj7-j4j8
https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a
https://github.com/scrapy/scrapy/security/advisories/GHSA-cjvr-mfj7-j4j8
https://huntr.dev/bounties/3da527b1-2348-4f69-9e88-2e11a96ac585
https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0577
| +| Scrapy | GHSA-mfjm-vh54-3f96 | MEDIUM | 2.5.0 | 2.6.0, 1.8.2 |
Expand...https://github.com/advisories/GHSA-mfjm-vh54-3f96
https://github.com/scrapy/scrapy/commit/e865c4430e58a4faa0e0766b23830f8423d6167a
https://github.com/scrapy/scrapy/security/advisories/GHSA-mfjm-vh54-3f96
| +| Twisted | CVE-2022-21712 | HIGH | 21.2.0 | 22.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21712
https://github.com/advisories/GHSA-92x2-jw7w-xvvx
https://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2
https://github.com/twisted/twisted/releases/tag/twisted-22.1.0
https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx
https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21712
| +| Werkzeug | pyup.io-42050 | UNKNOWN | 2.0.1 | 2.0.2 |
Expand...
| +| aiohttp | pyup.io-42692 | UNKNOWN | 3.7.4.post0 | 3.8.0 |
Expand...
| +| bokeh | CVE-2021-41182 | MEDIUM | 2.3.3 | 2.4.2 |
Expand...https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/
https://github.com/advisories/GHSA-9gj3-hwp5-pmwc
https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63
https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc
https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/
https://nvd.nist.gov/vuln/detail/CVE-2021-41182
https://security.netapp.com/advisory/ntap-20211118-0004/
https://www.drupal.org/sa-contrib-2022-004
https://www.drupal.org/sa-core-2022-002
| +| bokeh | CVE-2021-41183 | MEDIUM | 2.3.3 | 2.4.2 |
Expand...https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/
https://bugs.jqueryui.com/ticket/15284
https://github.com/advisories/GHSA-j7qv-pgf6-hvh4
https://github.com/jquery/jquery-ui/pull/1953
https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4
https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/
https://nvd.nist.gov/vuln/detail/CVE-2021-41183
https://security.netapp.com/advisory/ntap-20211118-0004/
https://www.drupal.org/sa-contrib-2022-004
https://www.drupal.org/sa-core-2022-001
https://www.drupal.org/sa-core-2022-002
| +| bokeh | CVE-2021-41184 | MEDIUM | 2.3.3 | 2.4.2 |
Expand...https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/
https://github.com/advisories/GHSA-gpqq-952q-5327
https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280
https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/
https://nvd.nist.gov/vuln/detail/CVE-2021-41184
https://security.netapp.com/advisory/ntap-20211118-0004/
https://www.drupal.org/sa-core-2022-001
| +| celery | CVE-2021-23727 | HIGH | 5.1.1 | 5.2.2 |
Expand...https://github.com/advisories/GHSA-q4xr-rc97-m4xx
https://github.com/celery/celery/blob/master/Changelog.rst%23522
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5/
https://nvd.nist.gov/vuln/detail/CVE-2021-23727
https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953
| +| celery | pyup.io-42498 | UNKNOWN | 5.1.1 | 5.2.0 |
Expand...
| +| dask | CVE-2021-42343 | CRITICAL | 2021.6.2 | 2021.10.0 |
Expand...https://docs.dask.org/en/latest/changelog.html
https://github.com/advisories/GHSA-j8fq-86c5-5v2r
https://github.com/dask/dask/tags
https://github.com/dask/distributed/commit/afce4be8e05fb180e50a9d9e38465f1a82295e1b
https://github.com/dask/distributed/pull/5427
https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr
https://nvd.nist.gov/vuln/detail/CVE-2021-42343
| +| distributed | CVE-2021-42343 | CRITICAL | 2021.6.2 | 2021.10.0 |
Expand...https://docs.dask.org/en/latest/changelog.html
https://github.com/advisories/GHSA-j8fq-86c5-5v2r
https://github.com/dask/dask/tags
https://github.com/dask/distributed/commit/afce4be8e05fb180e50a9d9e38465f1a82295e1b
https://github.com/dask/distributed/pull/5427
https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr
https://nvd.nist.gov/vuln/detail/CVE-2021-42343
| +| httpie | CVE-2022-0430 | MEDIUM | 2.4.0 | 3.1.0 |
Expand...https://github.com/advisories/GHSA-6pc9-xqrg-wfqw
https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b
https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f
https://nvd.nist.gov/vuln/detail/CVE-2022-0430
| +| httpie | CVE-2022-24737 | MEDIUM | 2.4.0 | 3.1.0 |
Expand...https://github.com/advisories/GHSA-9w4w-cpc8-h2fq
https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b
https://github.com/httpie/httpie/releases/tag/3.1.0
https://github.com/httpie/httpie/security/advisories/GHSA-9w4w-cpc8-h2fq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QZD2AZOL7XLNZVAV6GDNXYU6MFRU5RS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5VYSYKEKVZEVEBIWAADGDXG4Y3EWCQ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXFCHGTW3V32GD6GXXJZE5QAOSDT3RTY/
https://nvd.nist.gov/vuln/detail/CVE-2022-24737
| +| ipython | CVE-2022-21699 | HIGH | 7.24.1 | 8.0.1, 7.31.1, 7.16.3, 5.11 |
Expand...https://github.com/advisories/GHSA-pq7m-3gw7-gq5x
https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668
https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x
https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699
https://lists.debian.org/debian-lts-announce/2022/01/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CRQRTWHYXMLDJ572VGVUZMUPEOTPM3KB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZ7LVZBB4D7KVSFNEQUBEHFO3JW6D2ZK/
https://nvd.nist.gov/vuln/detail/CVE-2022-21699
| +| jupyter-server | pyup.io-41065 | UNKNOWN | 1.9.0 | 1.10.2 |
Expand...
| +| jupyter-server | pyup.io-42779 | UNKNOWN | 1.9.0 | 1.12.0 |
Expand...
| +| jupyter-server-proxy | CVE-2022-21697 | HIGH | 3.0.2 | 3.2.1 |
Expand...https://github.com/advisories/GHSA-gcv9-6737-pjqw
https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb
https://github.com/jupyterhub/jupyter-server-proxy/compare/v3.2.0...v3.2.1.patch
https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw
https://nvd.nist.gov/vuln/detail/CVE-2022-21697
| +| jupyterhub | CVE-2021-41247 | HIGH | 1.4.1 | 1.5.0 |
Expand...https://github.com/advisories/GHSA-cw7p-q79f-m2v7
https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27
https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-cw7p-q79f-m2v7
https://nvd.nist.gov/vuln/detail/CVE-2021-41247
| +| jupyterlab | CVE-2021-32797 | CRITICAL | 3.0.16 | 3.1.4, 3.0.17, 2.3.2, 2.2.10, 1.2.21 |
Expand...https://github.com/advisories/GHSA-4952-p58q-6crx
https://github.com/google/security-research/security/advisories/GHSA-c469-p3jp-2vhx
https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed
https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx
https://nvd.nist.gov/vuln/detail/CVE-2021-32797
| +| jupyterlab | pyup.io-40969 | UNKNOWN | 3.0.16 | 3.1.0b2 |
Expand...
| +| jupyterlab | pyup.io-41038 | UNKNOWN | 3.0.16 | 3.1.0 |
Expand...
| +| jupyterlab-git | pyup.io-41073 | UNKNOWN | 0.30.1 | 0.32.0 |
Expand...
| +| jupytext | CVE-2021-3807 | HIGH | 1.11.3 | 1.13.0 |
Expand...https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
| +| jupytext | pyup.io-41249 | UNKNOWN | 1.11.3 | 1.11.5 |
Expand...
| +| kombu | pyup.io-42497 | UNKNOWN | 5.1.0 | 5.2.1 |
Expand...
| +| lxml | CVE-2021-43818 | HIGH | 4.6.3 | 4.6.5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818
https://github.com/advisories/GHSA-55x5-fj6c-h6m8
https://github.com/lxml/lxml/blob/lxml-4.6.5/CHANGES.txt
https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a
https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a (lxml-4.6.5)
https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776
https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0
https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0 (lxml-4.6.5)
https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8
https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/
https://nvd.nist.gov/vuln/detail/CVE-2021-43818
https://security.netapp.com/advisory/ntap-20220107-0005/
https://ubuntu.com/security/notices/USN-5225-1
https://www.debian.org/security/2022/dsa-5043
| +| mlflow | CVE-2022-0736 | HIGH | 1.18.0 | 1.23.1 |
Expand...https://github.com/advisories/GHSA-vqj2-4v8m-8vrq
https://github.com/mlflow/mlflow/commit/61984e6843d2e59235d82a580c529920cd8f3711
https://huntr.dev/bounties/e5384764-c583-4dec-a1d8-4697f4e12f75
https://nvd.nist.gov/vuln/detail/CVE-2022-0736
| +| nbdime | CVE-2021-41134 | MEDIUM | 3.1.0 | 3.1.1, 2.1.1, 1.1.1 |
Expand...https://github.com/advisories/GHSA-p6rw-44q7-3fw4
https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea
https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4
https://nvd.nist.gov/vuln/detail/CVE-2021-41134
| +| nltk | CVE-2021-3828 | HIGH | 3.6.2 | 3.6.4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3828
https://github.com/advisories/GHSA-2ww3-fxvq-293j
https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6
https://github.com/nltk/nltk/pull/2816
https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32
https://nvd.nist.gov/vuln/detail/CVE-2021-3828
| +| nltk | CVE-2021-3842 | HIGH | 3.6.2 | 3.6.6 |
Expand...https://github.com/advisories/GHSA-rqjh-jp2r-59cj
https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d
https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a
https://nvd.nist.gov/vuln/detail/CVE-2021-3842
| +| nltk | CVE-2021-43854 | HIGH | 3.6.2 | 3.6.5 |
Expand...https://github.com/advisories/GHSA-f8m6-h2c7-8h9x
https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341
https://github.com/nltk/nltk/issues/2866
https://github.com/nltk/nltk/pull/2869
https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x
https://nvd.nist.gov/vuln/detail/CVE-2021-43854
| +| notebook | CVE-2021-32797 | CRITICAL | 6.4.0 | 6.4.1, 5.7.11 |
Expand...https://github.com/advisories/GHSA-4952-p58q-6crx
https://github.com/google/security-research/security/advisories/GHSA-c469-p3jp-2vhx
https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed
https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx
https://nvd.nist.gov/vuln/detail/CVE-2021-32797
| +| notebook | CVE-2021-32798 | CRITICAL | 6.4.0 | 6.4.1, 5.7.11 |
Expand...https://github.com/advisories/GHSA-hwvq-6gjx-j797
https://github.com/jupyter/notebook/commit/79fc76e890a8ec42f73a3d009e44ef84c14ef0d5
https://github.com/jupyter/notebook/security/advisories/GHSA-hwvq-6gjx-j797
https://nvd.nist.gov/vuln/detail/CVE-2021-32798
| +| numpy | CVE-2021-33430 | HIGH | 1.19.5 | 1.21.0rc1 |
Expand...https://github.com/advisories/GHSA-6p56-wp2h-9hxr
https://github.com/numpy/numpy/commit/ae317fd9ff3e79c0eac357d723bfc29cbd625f2e
https://github.com/numpy/numpy/issues/18939
https://nvd.nist.gov/vuln/detail/CVE-2021-33430
| +| numpy | CVE-2021-41495 | HIGH | 1.19.5 | 1.22.2 |
Expand...https://github.com/numpy/numpy/issues/19038
| +| numpy | CVE-2021-41496 | HIGH | 1.19.5 | 1.22.0 |
Expand...https://github.com/numpy/numpy/issues/19000
| +| numpy | CVE-2021-34141 | MEDIUM | 1.19.5 | 1.22.0 |
Expand...https://github.com/numpy/numpy/issues/18993
| +| pipenv | CVE-2022-21668 | HIGH | 2021.5.29 | |
Expand...https://github.com/advisories/GHSA-qc9x-gjcv-465w
https://github.com/pypa/pipenv/commit/439782a8ae36c4762c88e43d5f0d8e563371b46f
https://github.com/pypa/pipenv/releases/tag/v2022.1.8
https://github.com/pypa/pipenv/security/advisories/GHSA-qc9x-gjcv-465w
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56HBA3EOSLEDNCCBJVHE6DO34P56EOUM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KCROBYHUS6DKQPCXBRPCZ5CDBNQTYAWT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHQRIWKDP3SVJABAPEXBIQPKDI6UP7G4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21668
| +| sqlparse | CVE-2021-32839 | HIGH | 0.4.1 | 0.4.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32839
https://github.com/advisories/GHSA-p5w8-wqhj-9hhf
https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb
https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf
https://nvd.nist.gov/vuln/detail/CVE-2021-32839
https://securitylab.github.com/advisories/GHSL-2021-107-andialbrecht-sqlparse/
https://ubuntu.com/security/notices/USN-5085-1
| +| tensorflow | CVE-2022-23587 | CRITICAL | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-8jj7-5vxc-pg2q
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L2621-L2689
https://github.com/tensorflow/tensorflow/commit/0aaaae6eca5a7175a193696383f582f53adab23f
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8jj7-5vxc-pg2q
https://nvd.nist.gov/vuln/detail/CVE-2022-23587
| +| tensorflow | GHSA-h6gw-r52c-724r | CRITICAL | 2.5.0 | 2.7.1, 2.6.3, 2.5.3 |
Expand...https://github.com/advisories/GHSA-h6gw-r52c-724r
https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6gw-r52c-724r
| +| tensorflow | CVE-2020-10531 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00004.html
https://access.redhat.com/errata/RHSA-2020:0738
https://bugs.chromium.org/p/chromium/issues/detail?id=1044570
https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html
https://chromium.googlesource.com/chromium/deps/icu/+/9f4020916eb1f28f3666f018fdcbe6c9a37f0e08
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10531
https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca
https://github.com/unicode-org/icu/pull/971
https://linux.oracle.com/cve/CVE-2020-10531.html
https://linux.oracle.com/errata/ELSA-2020-1317.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/
https://security.gentoo.org/glsa/202003-15
https://ubuntu.com/security/notices/USN-4305-1
https://unicode-org.atlassian.net/browse/ICU-20958
https://usn.ubuntu.com/4305-1/
https://www.debian.org/security/2020/dsa-4646
https://www.oracle.com/security-alerts/cpujan2021.html
| +| tensorflow | CVE-2021-22901 | HIGH | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22901.html
https://github.com/curl/curl/commit/7f4a9a9b2a49547eae24d2e19bc5c346e9026479
https://hackerone.com/reports/1180380
https://security.netapp.com/advisory/ntap-20210723-0001/
https://security.netapp.com/advisory/ntap-20210727-0007/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| tensorflow | CVE-2021-22926 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22926.html
https://hackerone.com/reports/1234760
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://security.netapp.com/advisory/ntap-20210902-0003/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tensorflow | CVE-2021-37635 | HIGH | 2.5.0 | 2.3.4, 2.4.3, 2.5.1, 2.6.0 |
Expand...https://github.com/advisories/GHSA-cgfm-62j4-v4rf
https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cgfm-62j4-v4rf
https://nvd.nist.gov/vuln/detail/CVE-2021-37635
| +| tensorflow | CVE-2021-37638 | HIGH | 2.5.0 | 2.3.4, 2.5.1, 2.4.3, 2.6.0 |
Expand...https://github.com/advisories/GHSA-hwr7-8gxx-fj5p
https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hwr7-8gxx-fj5p
https://nvd.nist.gov/vuln/detail/CVE-2021-37638
| +| tensorflow | CVE-2021-37639 | HIGH | 2.5.0 | 2.3.4, 2.5.1, 2.4.3, 2.6.0 |
Expand...https://github.com/advisories/GHSA-gh6x-4whr-2qv4
https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh6x-4whr-2qv4
https://nvd.nist.gov/vuln/detail/CVE-2021-37639
| +| tensorflow | CVE-2021-37641 | HIGH | 2.5.0 | 2.6.0, 2.3.4, 2.5.1, 2.4.3 |
Expand...https://github.com/advisories/GHSA-9c8h-vvrj-w2p8
https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-vvrj-w2p8
https://nvd.nist.gov/vuln/detail/CVE-2021-37641
| +| tensorflow | CVE-2021-37643 | HIGH | 2.5.0 | 2.6.0, 2.3.4, 2.5.1, 2.4.3 |
Expand...https://github.com/advisories/GHSA-fcwc-p4fc-c5cc
https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fcwc-p4fc-c5cc
https://nvd.nist.gov/vuln/detail/CVE-2021-37643
| +| tensorflow | CVE-2021-37648 | HIGH | 2.5.0 | 2.3.4, 2.4.3, 2.5.1, 2.6.0 |
Expand...https://github.com/advisories/GHSA-wp77-4gmm-7cq8
https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wp77-4gmm-7cq8
https://nvd.nist.gov/vuln/detail/CVE-2021-37648
| +| tensorflow | CVE-2021-37650 | HIGH | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4 |
Expand...https://github.com/advisories/GHSA-f8h4-7rgh-q2gm
https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f8h4-7rgh-q2gm
https://nvd.nist.gov/vuln/detail/CVE-2021-37650
| +| tensorflow | CVE-2021-37651 | HIGH | 2.5.0 | 2.3.4, 2.5.1, 2.4.3, 2.6.0 |
Expand...https://github.com/advisories/GHSA-hpv4-7p9c-mvfr
https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hpv4-7p9c-mvfr
https://nvd.nist.gov/vuln/detail/CVE-2021-37651
| +| tensorflow | CVE-2021-37652 | HIGH | 2.5.0 | 2.3.4, 2.5.1, 2.4.3, 2.6.0 |
Expand...https://github.com/advisories/GHSA-m7fm-4jfh-jrg6
https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m7fm-4jfh-jrg6
https://nvd.nist.gov/vuln/detail/CVE-2021-37652
| +| tensorflow | CVE-2021-37654 | HIGH | 2.5.0 | 2.3.4, 2.5.1, 2.4.3, 2.6.0 |
Expand...https://github.com/advisories/GHSA-2r8p-fg3c-wcj4
https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2r8p-fg3c-wcj4
https://nvd.nist.gov/vuln/detail/CVE-2021-37654
| +| tensorflow | CVE-2021-37655 | HIGH | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4 |
Expand...https://github.com/advisories/GHSA-7fvx-3jfc-2cpc
https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7fvx-3jfc-2cpc
https://nvd.nist.gov/vuln/detail/CVE-2021-37655
| +| tensorflow | CVE-2021-37656 | HIGH | 2.5.0 | 2.3.4, 2.5.1, 2.4.3, 2.6.0 |
Expand...https://github.com/advisories/GHSA-4xfp-4pfp-89wg
https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4xfp-4pfp-89wg
https://nvd.nist.gov/vuln/detail/CVE-2021-37656
| +| tensorflow | CVE-2021-37657 | HIGH | 2.5.0 | 2.6.0, 2.3.4, 2.4.3, 2.5.1 |
Expand...https://github.com/advisories/GHSA-5xwc-mrhx-5g3m
https://github.com/tensorflow/tensorflow/commit/f2a673bd34f0d64b8e40a551ac78989d16daad09
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5xwc-mrhx-5g3m
https://nvd.nist.gov/vuln/detail/CVE-2021-37657
| +| tensorflow | CVE-2021-37658 | HIGH | 2.5.0 | 2.3.4, 2.5.1, 2.4.3, 2.6.0 |
Expand...https://github.com/advisories/GHSA-6p5r-g9mq-ggh2
https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6p5r-g9mq-ggh2
https://nvd.nist.gov/vuln/detail/CVE-2021-37658
| +| tensorflow | CVE-2021-37659 | HIGH | 2.5.0 | 2.3.4, 2.5.1, 2.4.3, 2.6.0 |
Expand...https://github.com/advisories/GHSA-q3g3-h9r4-prrc
https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q3g3-h9r4-prrc
https://nvd.nist.gov/vuln/detail/CVE-2021-37659
| +| tensorflow | CVE-2021-37662 | HIGH | 2.5.0 | 2.6.0, 2.3.4, 2.5.1, 2.4.3 |
Expand...https://github.com/advisories/GHSA-f5cx-5wr3-5qrc
https://github.com/tensorflow/tensorflow/commit/429f009d2b2c09028647dd4bb7b3f6f414bbaad7
https://github.com/tensorflow/tensorflow/commit/9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f5cx-5wr3-5qrc
https://nvd.nist.gov/vuln/detail/CVE-2021-37662
| +| tensorflow | CVE-2021-37663 | HIGH | 2.5.0 | 2.6.0, 2.3.4, 2.4.3, 2.5.1 |
Expand...https://github.com/advisories/GHSA-g25h-jr74-qp5j
https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j
https://nvd.nist.gov/vuln/detail/CVE-2021-37663
| +| tensorflow | CVE-2021-37664 | HIGH | 2.5.0 | 2.3.4, 2.5.1, 2.4.3, 2.6.0 |
Expand...https://github.com/advisories/GHSA-r4c4-5fpq-56wg
https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4c4-5fpq-56wg
https://nvd.nist.gov/vuln/detail/CVE-2021-37664
| +| tensorflow | CVE-2021-37665 | HIGH | 2.5.0 | 2.6.0, 2.3.4, 2.4.3, 2.5.1 |
Expand...https://github.com/advisories/GHSA-v82p-hv3v-p6qp
https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9
https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v82p-hv3v-p6qp
https://nvd.nist.gov/vuln/detail/CVE-2021-37665
| +| tensorflow | CVE-2021-37666 | HIGH | 2.5.0 | 2.6.0, 2.3.4, 2.5.1, 2.4.3 |
Expand...https://github.com/advisories/GHSA-w4xf-2pqw-5mq7
https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w4xf-2pqw-5mq7
https://nvd.nist.gov/vuln/detail/CVE-2021-37666
| +| tensorflow | CVE-2021-37667 | HIGH | 2.5.0 | 2.3.4, 2.4.3, 2.5.1, 2.6.0 |
Expand...https://github.com/advisories/GHSA-w74j-v8xh-3w5h
https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w74j-v8xh-3w5h
https://nvd.nist.gov/vuln/detail/CVE-2021-37667
| +| tensorflow | CVE-2021-37671 | HIGH | 2.5.0 | 2.3.4, 2.4.3, 2.5.1, 2.6.0 |
Expand...https://github.com/advisories/GHSA-qr82-2c78-4m8h
https://github.com/tensorflow/tensorflow/commit/532f5c5a547126c634fefd43bbad1dc6417678ac
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qr82-2c78-4m8h
https://nvd.nist.gov/vuln/detail/CVE-2021-37671
| +| tensorflow | CVE-2021-37676 | HIGH | 2.5.0 | 2.6.0, 2.3.4, 2.4.3, 2.5.1 |
Expand...https://github.com/advisories/GHSA-v768-w7m9-2vmm
https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v768-w7m9-2vmm
https://nvd.nist.gov/vuln/detail/CVE-2021-37676
| +| tensorflow | CVE-2021-37678 | HIGH | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4, 2.7.0 |
Expand...https://github.com/advisories/GHSA-r6jx-9g48-2r5r
https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6jx-9g48-2r5r
https://nvd.nist.gov/vuln/detail/CVE-2021-37678
| +| tensorflow | CVE-2021-37679 | HIGH | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4 |
Expand...https://github.com/advisories/GHSA-g8wg-cjwc-xhhp
https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g8wg-cjwc-xhhp
https://nvd.nist.gov/vuln/detail/CVE-2021-37679
| +| tensorflow | CVE-2021-37681 | HIGH | 2.5.0 | 2.6.0, 2.3.4, 2.5.1, 2.4.3 |
Expand...https://github.com/advisories/GHSA-7xwj-5r4v-429p
https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7xwj-5r4v-429p
https://nvd.nist.gov/vuln/detail/CVE-2021-37681
| +| tensorflow | CVE-2021-37682 | HIGH | 2.5.0 | 2.6.0, 2.4.3, 2.3.4, 2.5.1 |
Expand...https://github.com/advisories/GHSA-4c4g-crqm-xrxw
https://github.com/tensorflow/tensorflow/commit/4a91f2069f7145aab6ba2d8cfe41be8a110c18a5
https://github.com/tensorflow/tensorflow/commit/537bc7c723439b9194a358f64d871dd326c18887
https://github.com/tensorflow/tensorflow/commit/8933b8a21280696ab119b63263babdb54c298538
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4c4g-crqm-xrxw
https://nvd.nist.gov/vuln/detail/CVE-2021-37682
| +| tensorflow | CVE-2021-41201 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-j86v-p27c-73fm
https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j86v-p27c-73fm
https://nvd.nist.gov/vuln/detail/CVE-2021-41201
| +| tensorflow | CVE-2021-41203 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-7pxj-m4jf-r6h2
https://github.com/tensorflow/tensorflow/commit/368af875869a204b4ac552b9ddda59f6a46a56ec
https://github.com/tensorflow/tensorflow/commit/abcced051cb1bd8fb05046ac3b6023a7ebcc4578
https://github.com/tensorflow/tensorflow/commit/b619c6f865715ca3b15ef1842b5b95edbaa710ad
https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7pxj-m4jf-r6h2
https://nvd.nist.gov/vuln/detail/CVE-2021-41203
| +| tensorflow | CVE-2021-41205 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-49rx-x2rw-pc6f
https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rx-x2rw-pc6f
https://nvd.nist.gov/vuln/detail/CVE-2021-41205
| +| tensorflow | CVE-2021-41206 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-pgcq-h79j-2f69
https://github.com/tensorflow/tensorflow/commit/4d74d8a00b07441cba090a02e0dd9ed385145bf4
https://github.com/tensorflow/tensorflow/commit/4dddb2fd0b01cdd196101afbba6518658a2c9e07
https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d
https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a
https://github.com/tensorflow/tensorflow/commit/da4aad5946be30e5f049920fa076e1f7ef021261
https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69
https://nvd.nist.gov/vuln/detail/CVE-2021-41206
| +| tensorflow | CVE-2021-41208 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-57wx-m983-2f88
https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88
https://nvd.nist.gov/vuln/detail/CVE-2021-41208
| +| tensorflow | CVE-2021-41210 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-m342-ff57-4jcc
https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m342-ff57-4jcc
https://nvd.nist.gov/vuln/detail/CVE-2021-41210
| +| tensorflow | CVE-2021-41212 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-fr77-rrx3-cp7g
https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fr77-rrx3-cp7g
https://nvd.nist.gov/vuln/detail/CVE-2021-41212
| +| tensorflow | CVE-2021-41214 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-vwhq-49r4-gj9v
https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vwhq-49r4-gj9v
https://nvd.nist.gov/vuln/detail/CVE-2021-41214
| +| tensorflow | CVE-2021-41216 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-3ff2-r28g-w7h9
https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc#L121-L185
https://github.com/tensorflow/tensorflow/commit/c79ba87153ee343401dbe9d1954d7f79e521eb14
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3ff2-r28g-w7h9
https://nvd.nist.gov/vuln/detail/CVE-2021-41216
| +| tensorflow | CVE-2021-41219 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-4f99-p9c2-3j8x
https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4f99-p9c2-3j8x
https://nvd.nist.gov/vuln/detail/CVE-2021-41219
| +| tensorflow | CVE-2021-41221 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-cqv6-3phm-hcwx
https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqv6-3phm-hcwx
https://nvd.nist.gov/vuln/detail/CVE-2021-41221
| +| tensorflow | CVE-2021-41223 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-f54p-f6jp-4rhr
https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f54p-f6jp-4rhr
https://nvd.nist.gov/vuln/detail/CVE-2021-41223
| +| tensorflow | CVE-2021-41224 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-rg3m-hqc5-344v
https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rg3m-hqc5-344v
https://nvd.nist.gov/vuln/detail/CVE-2021-41224
| +| tensorflow | CVE-2021-41225 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-7r94-xv9v-63jw
https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7r94-xv9v-63jw
https://nvd.nist.gov/vuln/detail/CVE-2021-41225
| +| tensorflow | CVE-2021-41226 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-374m-jm66-3vj8
https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-374m-jm66-3vj8
https://nvd.nist.gov/vuln/detail/CVE-2021-41226
| +| tensorflow | CVE-2021-41228 | HIGH | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-3rcw-9p9x-582v
https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v
https://nvd.nist.gov/vuln/detail/CVE-2021-41228
| +| tensorflow | CVE-2022-21726 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-23hm-7w47-xw72
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153
https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-23hm-7w47-xw72
https://nvd.nist.gov/vuln/detail/CVE-2022-21726
| +| tensorflow | CVE-2022-21727 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-c6fh-56w7-fvjw
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L3001-L3034
https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c6fh-56w7-fvjw
https://nvd.nist.gov/vuln/detail/CVE-2022-21727
| +| tensorflow | CVE-2022-21728 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-6gmv-pjp9-p8w8
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.h#L415-L428
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L1636-L1671
https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gmv-pjp9-p8w8
https://nvd.nist.gov/vuln/detail/CVE-2022-21728
| +| tensorflow | CVE-2022-21730 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-vjg4-v33c-ggc4
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360
https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vjg4-v33c-ggc4
https://nvd.nist.gov/vuln/detail/CVE-2022-21730
| +| tensorflow | CVE-2022-21740 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-44qp-9wwf-734r
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273
https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a
https://github.com/tensorflow/tensorflow/commit/adbbabdb0d3abb3cdeac69e38a96de1d678b24b3
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-44qp-9wwf-734r
https://nvd.nist.gov/vuln/detail/CVE-2022-21740
| +| tensorflow | CVE-2022-23558 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-9gwq-6cwj-47h3
https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L24-L33
https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60
https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9gwq-6cwj-47h3
https://nvd.nist.gov/vuln/detail/CVE-2022-23558
| +| tensorflow | CVE-2022-23559 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-98p5-x8x4-c9m5
https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189
https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043
https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4
https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379e84f061a75e01
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98p5-x8x4-c9m5
https://nvd.nist.gov/vuln/detail/CVE-2022-23559
| +| tensorflow | CVE-2022-23560 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-4hvf-hxvg-f67v
https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/internal/utils/sparsity_format_converter.cc#L252-L293
https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvf-hxvg-f67v
https://nvd.nist.gov/vuln/detail/CVE-2022-23560
| +| tensorflow | CVE-2022-23561 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-9c78-vcq7-7vxq
https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c78-vcq7-7vxq
https://nvd.nist.gov/vuln/detail/CVE-2022-23561
| +| tensorflow | CVE-2022-23562 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-qx3f-p745-w4hr
https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732
https://github.com/tensorflow/tensorflow/issues/52676
https://github.com/tensorflow/tensorflow/pull/51733
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr
https://nvd.nist.gov/vuln/detail/CVE-2022-23562
| +| tensorflow | CVE-2022-23566 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-5qw5-89mw-wcg2
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.h#L394
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/graph_properties.cc#L1132-L1141
https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5qw5-89mw-wcg2
https://nvd.nist.gov/vuln/detail/CVE-2022-23566
| +| tensorflow | CVE-2022-23573 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-q85f-69q7-55h2
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143
https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2
https://nvd.nist.gov/vuln/detail/CVE-2022-23573
| +| tensorflow | CVE-2022-23574 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-77gp-3h4r-6428
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102
https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-77gp-3h4r-6428
https://nvd.nist.gov/vuln/detail/CVE-2022-23574
| +| tensorflow | CVE-2022-23591 | HIGH | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-247x-2f9f-5wp7
https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-247x-2f9f-5wp7
https://nvd.nist.gov/vuln/detail/CVE-2022-23591
| +| tensorflow | GHSA-43q8-3fv7-pr5x | HIGH | 2.5.0 | 2.7.1, 2.6.3, 2.5.3 |
Expand...https://github.com/advisories/GHSA-43q8-3fv7-pr5x
https://github.com/tensorflow/tensorflow/commit/61bf91e768173b001d56923600b40d9a95a04ad5
https://github.com/tensorflow/tensorflow/pull/53695
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43q8-3fv7-pr5x
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69
| +| tensorflow | CVE-2021-22876 | MEDIUM | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22876.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
https://hackerone.com/reports/1101882
https://linux.oracle.com/cve/CVE-2021-22876.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
https://security.gentoo.org/glsa/202105-36
https://security.netapp.com/advisory/ntap-20210521-0007/
https://ubuntu.com/security/notices/USN-4898-1
https://ubuntu.com/security/notices/USN-4903-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| tensorflow | CVE-2021-22897 | MEDIUM | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22897.html
https://github.com/curl/curl/commit/bbb71507b7bab52002f9b1e0880bed6a32834511
https://hackerone.com/reports/1172857
https://security.netapp.com/advisory/ntap-20210727-0007/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| tensorflow | CVE-2021-22922 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tensorflow | CVE-2021-22923 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tensorflow | CVE-2021-22925 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tensorflow | CVE-2021-37636 | MEDIUM | 2.5.0 | 2.3.4, 2.4.3, 2.5.1, 2.6.0 |
Expand...https://github.com/advisories/GHSA-hp4c-x6r7-6555
https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555
https://nvd.nist.gov/vuln/detail/CVE-2021-37636
| +| tensorflow | CVE-2021-37637 | MEDIUM | 2.5.0 | 2.3.4, 2.4.3, 2.5.1, 2.6.0 |
Expand...https://github.com/advisories/GHSA-c9qf-r67m-p7cg
https://github.com/tensorflow/tensorflow/commit/5dc7f6981fdaf74c8c5be41f393df705841fb7c5
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9qf-r67m-p7cg
https://nvd.nist.gov/vuln/detail/CVE-2021-37637
| +| tensorflow | CVE-2021-37640 | MEDIUM | 2.5.0 | 2.5.1, 2.6.0 |
Expand...https://github.com/advisories/GHSA-95xm-g58g-3p88
https://github.com/tensorflow/tensorflow/commit/4923de56ec94fff7770df259ab7f2288a74feb41
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-95xm-g58g-3p88
https://nvd.nist.gov/vuln/detail/CVE-2021-37640
| +| tensorflow | CVE-2021-37642 | MEDIUM | 2.5.0 | 2.3.4, 2.4.3, 2.5.1, 2.6.0 |
Expand...https://github.com/advisories/GHSA-ch4f-829c-v5pw
https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ch4f-829c-v5pw
https://nvd.nist.gov/vuln/detail/CVE-2021-37642
| +| tensorflow | CVE-2021-37644 | MEDIUM | 2.5.0 | 2.6.0, 2.3.4, 2.5.1, 2.4.3 |
Expand...https://github.com/advisories/GHSA-27j5-4p9v-pp67
https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27j5-4p9v-pp67
https://nvd.nist.gov/vuln/detail/CVE-2021-37644
| +| tensorflow | CVE-2021-37645 | MEDIUM | 2.5.0 | 2.5.1, 2.4.3, 2.3.4, 2.6.0 |
Expand...https://github.com/advisories/GHSA-9w2p-5mgw-p94c
https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9w2p-5mgw-p94c
https://nvd.nist.gov/vuln/detail/CVE-2021-37645
| +| tensorflow | CVE-2021-37646 | MEDIUM | 2.5.0 | 2.6.0, 2.3.4, 2.5.1, 2.4.3 |
Expand...https://github.com/advisories/GHSA-h6jh-7gv5-28vg
https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6jh-7gv5-28vg
https://nvd.nist.gov/vuln/detail/CVE-2021-37646
| +| tensorflow | CVE-2021-37647 | MEDIUM | 2.5.0 | 2.3.4, 2.5.1, 2.4.3, 2.6.0 |
Expand...https://github.com/advisories/GHSA-c5x2-p679-95wc
https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c5x2-p679-95wc
https://nvd.nist.gov/vuln/detail/CVE-2021-37647
| +| tensorflow | CVE-2021-37649 | MEDIUM | 2.5.0 | 2.3.4, 2.5.1, 2.4.3, 2.6.0 |
Expand...https://github.com/advisories/GHSA-6gv8-p3vj-pxvr
https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gv8-p3vj-pxvr
https://nvd.nist.gov/vuln/detail/CVE-2021-37649
| +| tensorflow | CVE-2021-37653 | MEDIUM | 2.5.0 | 2.6.0, 2.3.4, 2.4.3, 2.5.1 |
Expand...https://github.com/advisories/GHSA-qjj8-32p7-h289
https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjj8-32p7-h289
https://nvd.nist.gov/vuln/detail/CVE-2021-37653
| +| tensorflow | CVE-2021-37660 | MEDIUM | 2.5.0 | 2.6.0, 2.3.4, 2.4.3, 2.5.1 |
Expand...https://github.com/advisories/GHSA-cm5x-837x-jf3c
https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cm5x-837x-jf3c
https://nvd.nist.gov/vuln/detail/CVE-2021-37660
| +| tensorflow | CVE-2021-37661 | MEDIUM | 2.5.0 | 2.6.0, 2.3.4, 2.4.3, 2.5.1 |
Expand...https://github.com/advisories/GHSA-gf88-j2mg-cc82
https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf88-j2mg-cc82
https://nvd.nist.gov/vuln/detail/CVE-2021-37661
| +| tensorflow | CVE-2021-37668 | MEDIUM | 2.5.0 | 2.6.0, 2.3.4, 2.4.3, 2.5.1 |
Expand...https://github.com/advisories/GHSA-2wmv-37vq-52g5
https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2wmv-37vq-52g5
https://nvd.nist.gov/vuln/detail/CVE-2021-37668
| +| tensorflow | CVE-2021-37669 | MEDIUM | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4 |
Expand...https://github.com/advisories/GHSA-vmjw-c2vp-p33c
https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d
https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vmjw-c2vp-p33c
https://nvd.nist.gov/vuln/detail/CVE-2021-37669
| +| tensorflow | CVE-2021-37670 | MEDIUM | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4 |
Expand...https://github.com/advisories/GHSA-9697-98pf-4rw7
https://github.com/tensorflow/tensorflow/commit/42459e4273c2e47a3232cc16c4f4fff3b3a35c38
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7
https://nvd.nist.gov/vuln/detail/CVE-2021-37670
| +| tensorflow | CVE-2021-37672 | MEDIUM | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4 |
Expand...https://github.com/advisories/GHSA-5hj3-vjjf-f5m7
https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hj3-vjjf-f5m7
https://nvd.nist.gov/vuln/detail/CVE-2021-37672
| +| tensorflow | CVE-2021-37673 | MEDIUM | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4 |
Expand...https://github.com/advisories/GHSA-278g-rq84-9hmg
https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-278g-rq84-9hmg
https://nvd.nist.gov/vuln/detail/CVE-2021-37673
| +| tensorflow | CVE-2021-37674 | MEDIUM | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4 |
Expand...https://github.com/advisories/GHSA-7ghq-fvr3-pj2x
https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-068.md
https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7ghq-fvr3-pj2x
https://nvd.nist.gov/vuln/detail/CVE-2021-37674
| +| tensorflow | CVE-2021-37675 | MEDIUM | 2.5.0 | 2.6.0, 2.3.4, 2.4.3, 2.5.1 |
Expand...https://github.com/advisories/GHSA-9c8h-2mv3-49ww
https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-2mv3-49ww
https://nvd.nist.gov/vuln/detail/CVE-2021-37675
| +| tensorflow | CVE-2021-37677 | MEDIUM | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4 |
Expand...https://github.com/advisories/GHSA-qfpc-5pjr-mh26
https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qfpc-5pjr-mh26
https://nvd.nist.gov/vuln/detail/CVE-2021-37677
| +| tensorflow | CVE-2021-37680 | MEDIUM | 2.5.0 | 2.3.4, 2.4.3, 2.5.1, 2.6.0 |
Expand...https://github.com/advisories/GHSA-cfpj-3q4c-jhvr
https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfpj-3q4c-jhvr
https://nvd.nist.gov/vuln/detail/CVE-2021-37680
| +| tensorflow | CVE-2021-37683 | MEDIUM | 2.5.0 | 2.3.4, 2.4.3, 2.5.1, 2.6.0 |
Expand...https://github.com/advisories/GHSA-rhrq-64mq-hf9h
https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rhrq-64mq-hf9h
https://nvd.nist.gov/vuln/detail/CVE-2021-37683
| +| tensorflow | CVE-2021-37684 | MEDIUM | 2.5.0 | 2.6.0, 2.3.4, 2.5.1, 2.4.3 |
Expand...https://github.com/advisories/GHSA-q7f7-544h-67h9
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q7f7-544h-67h9
https://nvd.nist.gov/vuln/detail/CVE-2021-37684
| +| tensorflow | CVE-2021-37685 | MEDIUM | 2.5.0 | 2.6.0, 2.3.4, 2.4.3, 2.5.1 |
Expand...https://github.com/advisories/GHSA-c545-c4f9-rf6v
https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c545-c4f9-rf6v
https://nvd.nist.gov/vuln/detail/CVE-2021-37685
| +| tensorflow | CVE-2021-37686 | MEDIUM | 2.5.0 | 2.3.4rc0, 2.4.3rc0, 2.6.0 |
Expand...https://github.com/advisories/GHSA-mhhc-q96p-mfm9
https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695
https://github.com/tensorflow/tensorflow/releases/tag/v2.3.4
https://github.com/tensorflow/tensorflow/releases/tag/v2.4.3
https://github.com/tensorflow/tensorflow/releases/tag/v2.5.1
https://github.com/tensorflow/tensorflow/releases/tag/v2.6.0
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mhhc-q96p-mfm9
https://nvd.nist.gov/vuln/detail/CVE-2021-37686
| +| tensorflow | CVE-2021-37687 | MEDIUM | 2.5.0 | 2.6.0, 2.3.4, 2.4.3, 2.5.1 |
Expand...https://github.com/advisories/GHSA-jwf9-w5xm-f437
https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f
https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jwf9-w5xm-f437
https://nvd.nist.gov/vuln/detail/CVE-2021-37687
| +| tensorflow | CVE-2021-37688 | MEDIUM | 2.5.0 | 2.5.1, 2.4.3, 2.3.4, 2.6.0 |
Expand...https://github.com/advisories/GHSA-vcjj-9vg7-vf68
https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vcjj-9vg7-vf68
https://nvd.nist.gov/vuln/detail/CVE-2021-37688
| +| tensorflow | CVE-2021-37689 | MEDIUM | 2.5.0 | 2.3.4, 2.4.3, 2.5.1, 2.6.0 |
Expand...https://github.com/advisories/GHSA-wf5p-c75w-w3wh
https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wf5p-c75w-w3wh
https://nvd.nist.gov/vuln/detail/CVE-2021-37689
| +| tensorflow | CVE-2021-37690 | MEDIUM | 2.5.0 | 2.6.0, 2.4.3, 2.3.4, 2.5.1 |
Expand...https://github.com/advisories/GHSA-3hxh-8cp2-g4hg
https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3hxh-8cp2-g4hg
https://nvd.nist.gov/vuln/detail/CVE-2021-37690
| +| tensorflow | CVE-2021-37691 | MEDIUM | 2.5.0 | 2.5.1, 2.4.3, 2.3.4, 2.6.0 |
Expand...https://github.com/advisories/GHSA-27qf-jwm8-g7f3
https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27qf-jwm8-g7f3
https://nvd.nist.gov/vuln/detail/CVE-2021-37691
| +| tensorflow | CVE-2021-37692 | MEDIUM | 2.5.0 | 2.5.1, 2.6.0 |
Expand...https://github.com/advisories/GHSA-cmgw-8vpc-rc59
https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22
https://github.com/tensorflow/tensorflow/pull/50508
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cmgw-8vpc-rc59
https://nvd.nist.gov/vuln/detail/CVE-2021-37692
| +| tensorflow | CVE-2021-41195 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-cq76-mxrc-vchh
https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429
https://github.com/tensorflow/tensorflow/issues/46888
https://github.com/tensorflow/tensorflow/pull/51733
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh
https://nvd.nist.gov/vuln/detail/CVE-2021-41195
| +| tensorflow | CVE-2021-41196 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-m539-j985-hcr8
https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b
https://github.com/tensorflow/tensorflow/issues/51936
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8
https://nvd.nist.gov/vuln/detail/CVE-2021-41196
| +| tensorflow | CVE-2021-41197 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-prcg-wp5q-rv7p
https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85
https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf
https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15
https://github.com/tensorflow/tensorflow/issues/46890
https://github.com/tensorflow/tensorflow/issues/51908
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p
https://nvd.nist.gov/vuln/detail/CVE-2021-41197
| +| tensorflow | CVE-2021-41198 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-2p25-55c9-h58q
https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f
https://github.com/tensorflow/tensorflow/issues/46911
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q
https://nvd.nist.gov/vuln/detail/CVE-2021-41198
| +| tensorflow | CVE-2021-41199 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-5hx2-qx8j-qjqm
https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837
https://github.com/tensorflow/tensorflow/issues/46914
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hx2-qx8j-qjqm
https://nvd.nist.gov/vuln/detail/CVE-2021-41199
| +| tensorflow | CVE-2021-41200 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-gh8h-7j2j-qv4f
https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e
https://github.com/tensorflow/tensorflow/issues/46909
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f
https://nvd.nist.gov/vuln/detail/CVE-2021-41200
| +| tensorflow | CVE-2021-41202 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-xrqm-fpgr-6hhx
https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94
https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899
https://github.com/tensorflow/tensorflow/issues/46889
https://github.com/tensorflow/tensorflow/issues/46912
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx
https://nvd.nist.gov/vuln/detail/CVE-2021-41202
| +| tensorflow | CVE-2021-41204 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-786j-5qwq-r36x
https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-786j-5qwq-r36x
https://nvd.nist.gov/vuln/detail/CVE-2021-41204
| +| tensorflow | CVE-2021-41207 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-7v94-64hj-m82h
https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7v94-64hj-m82h
https://nvd.nist.gov/vuln/detail/CVE-2021-41207
| +| tensorflow | CVE-2021-41209 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-6hpv-v2rx-c5g6
https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6
https://nvd.nist.gov/vuln/detail/CVE-2021-41209
| +| tensorflow | CVE-2021-41213 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-h67m-xg8f-fxcf
https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h67m-xg8f-fxcf
https://nvd.nist.gov/vuln/detail/CVE-2021-41213
| +| tensorflow | CVE-2021-41215 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-x3v8-c8qx-3j3r
https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x3v8-c8qx-3j3r
https://nvd.nist.gov/vuln/detail/CVE-2021-41215
| +| tensorflow | CVE-2021-41217 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-5crj-c72x-m7gq
https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5crj-c72x-m7gq
https://nvd.nist.gov/vuln/detail/CVE-2021-41217
| +| tensorflow | CVE-2021-41218 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-9crf-c6qr-r273
https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9crf-c6qr-r273
https://nvd.nist.gov/vuln/detail/CVE-2021-41218
| +| tensorflow | CVE-2021-41222 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-cpf4-wx82-gxp6
https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cpf4-wx82-gxp6
https://nvd.nist.gov/vuln/detail/CVE-2021-41222
| +| tensorflow | CVE-2021-41227 | MEDIUM | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://github.com/advisories/GHSA-j8c8-67vp-6mx7
https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b
https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8c8-67vp-6mx7
https://nvd.nist.gov/vuln/detail/CVE-2021-41227
| +| tensorflow | CVE-2022-21725 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-v3f7-j968-4h5f
https://github.com/tensorflow/tensorflow/blob/ffa202a17ab7a4a10182b746d230ea66f021fe16/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L189-L198
https://github.com/tensorflow/tensorflow/commit/3218043d6d3a019756607643cf65574fbfef5d7a
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v3f7-j968-4h5f
https://nvd.nist.gov/vuln/detail/CVE-2022-21725
| +| tensorflow | CVE-2022-21729 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-34f9-hjfq-rr8j
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/unravel_index_op.cc#L36-L135
https://github.com/tensorflow/tensorflow/commit/58b34c6c8250983948b5a781b426f6aa01fd47af
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-34f9-hjfq-rr8j
https://nvd.nist.gov/vuln/detail/CVE-2022-21729
| +| tensorflow | CVE-2022-21731 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-m4hf-j54p-p353
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.cc#L345-L358
https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m4hf-j54p-p353
https://nvd.nist.gov/vuln/detail/CVE-2022-21731
| +| tensorflow | CVE-2022-21732 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-c582-c96p-r5cq
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135
https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c582-c96p-r5cq
https://nvd.nist.gov/vuln/detail/CVE-2022-21732
| +| tensorflow | CVE-2022-21733 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-98j8-c9q4-r38g
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161
https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98j8-c9q4-r38g
https://nvd.nist.gov/vuln/detail/CVE-2022-21733
| +| tensorflow | CVE-2022-21734 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-gcvh-66ff-4mwm
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550
https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66ff-4mwm
https://nvd.nist.gov/vuln/detail/CVE-2022-21734
| +| tensorflow | CVE-2022-21735 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-87v6-crgm-2gfj
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_max_pool_op.cc#L36-L192
https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-87v6-crgm-2gfj
https://nvd.nist.gov/vuln/detail/CVE-2022-21735
| +| tensorflow | CVE-2022-21736 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-pfjj-m3jj-9jc9
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L227-L292
https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pfjj-m3jj-9jc9
https://nvd.nist.gov/vuln/detail/CVE-2022-21736
| +| tensorflow | CVE-2022-21737 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-f2vv-v9cg-qhh7
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc
https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2vv-v9cg-qhh7
https://nvd.nist.gov/vuln/detail/CVE-2022-21737
| +| tensorflow | CVE-2022-21738 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-x4qx-4fjv-hmw6
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273
https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4qx-4fjv-hmw6
https://nvd.nist.gov/vuln/detail/CVE-2022-21738
| +| tensorflow | CVE-2022-21739 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-3mw4-6rj6-74g5
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/quantized_pooling_ops.cc#L114-L130
https://github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3mw4-6rj6-74g5
https://nvd.nist.gov/vuln/detail/CVE-2022-21739
| +| tensorflow | CVE-2022-21741 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-428x-9xc2-m8mj
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96
https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-428x-9xc2-m8mj
https://nvd.nist.gov/vuln/detail/CVE-2022-21741
| +| tensorflow | CVE-2022-23557 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-gf2j-f278-xh4v
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75
https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf2j-f278-xh4v
https://nvd.nist.gov/vuln/detail/CVE-2022-23557
| +| tensorflow | CVE-2022-23563 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-wc4g-r73w-x8mm
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wc4g-r73w-x8mm
https://nvd.nist.gov/vuln/detail/CVE-2022-23563
| +| tensorflow | CVE-2022-23564 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-8rcj-c8pj-v3m3
https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rcj-c8pj-v3m3
https://nvd.nist.gov/vuln/detail/CVE-2022-23564
| +| tensorflow | CVE-2022-23565 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-4v5p-v5h9-6xjx
https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx
https://nvd.nist.gov/vuln/detail/CVE-2022-23565
| +| tensorflow | CVE-2022-23567 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-rrx2-r989-2c43
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc
https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md
https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8
https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrx2-r989-2c43
https://nvd.nist.gov/vuln/detail/CVE-2022-23567
| +| tensorflow | CVE-2022-23568 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-6445-fm66-fvq2
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_tensors_map_ops.cc
https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8
https://github.com/tensorflow/tensorflow/commit/b51b82fe65ebace4475e3c54eb089c18a4403f1c
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6445-fm66-fvq2
https://nvd.nist.gov/vuln/detail/CVE-2022-23568
| +| tensorflow | CVE-2022-23569 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-qj5r-f9mv-rffh
https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qj5r-f9mv-rffh
https://nvd.nist.gov/vuln/detail/CVE-2022-23569
| +| tensorflow | CVE-2022-23570 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-9p77-mmrw-69c7
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L104-L106
https://github.com/tensorflow/tensorflow/commit/8a513cec4bec15961fbfdedcaa5376522980455c
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9p77-mmrw-69c7
https://nvd.nist.gov/vuln/detail/CVE-2022-23570
| +| tensorflow | CVE-2022-23571 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-j3mj-fhpq-qqjj
https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j3mj-fhpq-qqjj
https://nvd.nist.gov/vuln/detail/CVE-2022-23571
| +| tensorflow | CVE-2022-23572 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-rww7-2gpw-fv6j
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174
https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rww7-2gpw-fv6j
https://nvd.nist.gov/vuln/detail/CVE-2022-23572
| +| tensorflow | CVE-2022-23575 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-c94w-c95p-phf8
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558
https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c94w-c95p-phf8
https://nvd.nist.gov/vuln/detail/CVE-2022-23575
| +| tensorflow | CVE-2022-23576 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-wm93-f238-7v37
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1598-L1617
https://github.com/tensorflow/tensorflow/commit/b9bd6cfd1c50e6807846af9a86f9b83cafc9c8ae
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wm93-f238-7v37
https://nvd.nist.gov/vuln/detail/CVE-2022-23576
| +| tensorflow | CVE-2022-23577 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-8cxv-76p7-jxwr
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/cc/saved_model/loader_util.cc#L31-L61
https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8cxv-76p7-jxwr
https://nvd.nist.gov/vuln/detail/CVE-2022-23577
| +| tensorflow | CVE-2022-23578 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-8r7c-3cm2-3h8f
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/common_runtime/immutable_executor_state.cc#L84-L262
https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8r7c-3cm2-3h8f
https://nvd.nist.gov/vuln/detail/CVE-2022-23578
| +| tensorflow | CVE-2022-23579 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-5f2r-qp73-37mr
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98
https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5f2r-qp73-37mr
https://nvd.nist.gov/vuln/detail/CVE-2022-23579
| +| tensorflow | CVE-2022-23580 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-627q-g293-49q7
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L788-L790
https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-627q-g293-49q7
https://nvd.nist.gov/vuln/detail/CVE-2022-23580
| +| tensorflow | CVE-2022-23581 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-fq86-3f29-px2c
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1687-L1742
https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082
https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6
https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq86-3f29-px2c
https://nvd.nist.gov/vuln/detail/CVE-2022-23581
| +| tensorflow | CVE-2022-23582 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-4j82-5ccr-4r8v
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.cc#L46-L50
https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4j82-5ccr-4r8v
https://nvd.nist.gov/vuln/detail/CVE-2022-23582
| +| tensorflow | CVE-2022-23583 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-gjqc-q9g6-q2j3
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137
https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjqc-q9g6-q2j3
https://nvd.nist.gov/vuln/detail/CVE-2022-23583
| +| tensorflow | CVE-2022-23584 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-24x4-6qmh-88qg
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346
https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x4-6qmh-88qg
https://nvd.nist.gov/vuln/detail/CVE-2022-23584
| +| tensorflow | CVE-2022-23585 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-fq6p-6334-8gr4
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416
https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq6p-6334-8gr4
https://nvd.nist.gov/vuln/detail/CVE-2022-23585
| +| tensorflow | CVE-2022-23586 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-43jf-985q-588j
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/function.cc
https://github.com/tensorflow/tensorflow/commit/3d89911481ba6ebe8c88c1c0b595412121e6c645
https://github.com/tensorflow/tensorflow/commit/dcc21c7bc972b10b6fb95c2fb0f4ab5a59680ec2
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43jf-985q-588j
https://nvd.nist.gov/vuln/detail/CVE-2022-23586
| +| tensorflow | CVE-2022-23588 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-fx5c-h9f6-rv7c
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/tensor.cc#L733-L781
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1328-L1402
https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fx5c-h9f6-rv7c
https://nvd.nist.gov/vuln/detail/CVE-2022-23588
| +| tensorflow | CVE-2022-23589 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-9px9-73fg-3fqp
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/mutable_graph_view.cc#L59-L74
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L3466-L3497
https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf
https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9px9-73fg-3fqp
https://nvd.nist.gov/vuln/detail/CVE-2022-23589
| +| tensorflow | CVE-2022-23595 | MEDIUM | 2.5.0 | 2.5.3, 2.6.3, 2.7.1, 2.8.0 |
Expand...https://github.com/advisories/GHSA-fpcp-9h7m-ffpx
https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104
https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fpcp-9h7m-ffpx
https://nvd.nist.gov/vuln/detail/CVE-2022-23595
| +| tensorflow | GHSA-wcv5-vrvr-3rx2 | MEDIUM | 2.5.0 | 2.7.1, 2.6.3, 2.5.3 |
Expand...https://github.com/advisories/GHSA-wcv5-vrvr-3rx2
https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-vrvr-3rx2
| +| tensorflow | CVE-2021-22898 | LOW | 2.5.0 | 2.6.0, 2.5.1, 2.4.3, 2.3.4 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| tensorflow | CVE-2021-22924 | LOW | 2.5.0 | 2.4.4, 2.5.2, 2.6.1 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| ujson | CVE-2021-45958 | MEDIUM | 4.0.2 | 5.1.0 |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009
https://github.com/advisories/GHSA-fh56-85cw-5pq6
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml
https://github.com/ultrajson/ultrajson/issues/501
https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284
https://github.com/ultrajson/ultrajson/pull/504
https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-45958
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/prometheus/prometheus | CVE-2019-3826 | MEDIUM | v2.5.0+incompatible | v2.7.1 |
Expand...https://access.redhat.com/errata/RHBA-2019:0327
https://advisory.checkmarx.net/advisory/CX-2019-4297
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3826
https://github.com/prometheus/prometheus/commit/62e591f9
https://github.com/prometheus/prometheus/pull/5163
https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573@%3Ccommits.zookeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3826
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/dgrijalva/jwt-go | CVE-2020-26160 | HIGH | v3.2.0+incompatible | |
Expand...https://github.com/dgrijalva/jwt-go/pull/426
https://nvd.nist.gov/vuln/detail/CVE-2020-26160
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515
| +| github.com/mholt/archiver | CVE-2019-10743 | MEDIUM | v3.1.1+incompatible | 3.3.2 |
Expand...https://github.com/advisories/GHSA-h74j-692g-48mq
https://github.com/mholt/archiver/commit/8217ed3a206c0473b4ec1aff51375b398838073a
https://github.com/mholt/archiver/pull/169
https://github.com/mholt/archiver/pull/203
https://github.com/snyk/zip-slip-vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2019-10743
https://snyk.io/research/zip-slip-vulnerability
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728,
| +| github.com/miekg/dns | CVE-2019-19794 | MEDIUM | v1.1.3 | 1.1.25-0.20191211073109-8ebf2e419df7 |
Expand...https://github.com/advisories/GHSA-44r7-7p62-q3fr
https://github.com/coredns/coredns/issues/3519
https://github.com/coredns/coredns/issues/3547
https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33
https://github.com/miekg/dns/compare/v1.1.24...v1.1.25
https://github.com/miekg/dns/issues/1043
https://github.com/miekg/dns/pull/1044
https://nvd.nist.gov/vuln/detail/CVE-2019-19794
| +| github.com/ulikunitz/xz | CVE-2020-16845 | HIGH | v0.5.6 | 0.5.8 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| github.com/ulikunitz/xz | CVE-2021-29482 | HIGH | v0.5.6 | 0.5.8 |
Expand...https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27
https://nvd.nist.gov/vuln/detail/CVE-2021-29482
| +| golang.org/x/text | CVE-2020-14040 | HIGH | v0.3.2 | 0.3.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14040
https://github.com/advisories/GHSA-5rcv-m4m3-hfh7
https://github.com/golang/go/issues/39491
https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e
https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0
https://linux.oracle.com/cve/CVE-2020-14040.html
https://linux.oracle.com/errata/ELSA-2020-4694.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://nvd.nist.gov/vuln/detail/CVE-2020-14040
| +| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.2 | 0.3.7 |
Expand...
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/incubator/ml-workspace/0.0.1/templates/common.yaml b/incubator/ml-workspace/0.0.1/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/incubator/ml-workspace/0.0.1/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/incubator/ml-workspace/0.0.1/values.yaml b/incubator/ml-workspace/0.0.1/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/incubator/ml-workspace/item.yaml b/incubator/ml-workspace/item.yaml new file mode 100644 index 00000000000..3073de9af61 --- /dev/null +++ b/incubator/ml-workspace/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/ml-workspace.png +categories: +- utility +