Commit new App releases for TrueCharts

Signed-off-by: TrueCharts-Bot <bot@truecharts.org>
This commit is contained in:
TrueCharts-Bot 2022-06-27 16:33:15 +00:00
parent 9ef915c1fd
commit 7cdea16615
124 changed files with 11638 additions and 133 deletions

View File

@ -1,6 +1,16 @@
# Changelog<br>
<a name="mongodb-1.0.19"></a>
### [mongodb-1.0.19](https://github.com/truecharts/apps/compare/mongodb-1.0.18...mongodb-1.0.19) (2022-06-27)
#### Chore
* update docker general non-major ([#2999](https://github.com/truecharts/apps/issues/2999))
* update docker general non-major ([#2960](https://github.com/truecharts/apps/issues/2960))
<a name="mongodb-1.0.18"></a>
### [mongodb-1.0.18](https://github.com/truecharts/apps/compare/mongodb-1.0.17...mongodb-1.0.18) (2022-06-25)
@ -87,13 +97,3 @@
#### Chore
* update docker general non-major ([#2904](https://github.com/truecharts/apps/issues/2904))
<a name="mongodb-1.0.8"></a>
### [mongodb-1.0.8](https://github.com/truecharts/apps/compare/mongodb-1.0.7...mongodb-1.0.8) (2022-06-15)
#### Chore
* update helm chart common to v10.0.11 ([#2899](https://github.com/truecharts/apps/issues/2899))

View File

@ -3,4 +3,4 @@ dependencies:
repository: https://library-charts.truecharts.org
version: 10.1.4
digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2
generated: "2022-06-26T20:12:56.289461238Z"
generated: "2022-06-27T16:19:54.247984435Z"

View File

@ -23,7 +23,7 @@ sources:
- https://github.com/bitnami/bitnami-docker-mongodb
- https://www.mongodb.com
type: application
version: 1.0.18
version: 1.0.19
annotations:
truecharts.org/catagories: |
- database

View File

@ -1,7 +1,7 @@
image:
repository: ghcr.io/truecharts/mongodb
pullPolicy: IfNotPresent
tag: v5.0.9@sha256:c15a49a8255690f067299d1a001f7f165218d90fe8c66fd4daf0e33c3a107307
tag: v5.0.9@sha256:b299247da6b15b4ca2a751539d391c23637c135fd421d214976e8ed078480a66
controller:
# -- Set the controller type.

View File

@ -40,7 +40,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730
tccr.io/truecharts/mongodb:v5.0.9@sha256:c15a49a8255690f067299d1a001f7f165218d90fe8c66fd4daf0e33c3a107307
tccr.io/truecharts/mongodb:v5.0.9@sha256:b299247da6b15b4ca2a751539d391c23637c135fd421d214976e8ed078480a66
##### Scan Results
@ -57,7 +57,7 @@ hide:
#### Container: tccr.io/truecharts/mongodb:v5.0.9@sha256:c15a49a8255690f067299d1a001f7f165218d90fe8c66fd4daf0e33c3a107307 (debian 10.12)
#### Container: tccr.io/truecharts/mongodb:v5.0.9@sha256:b299247da6b15b4ca2a751539d391c23637c135fd421d214976e8ed078480a66 (debian 10.12)
**debian**
@ -196,9 +196,8 @@ hide:
| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-13115">https://access.redhat.com/security/cve/CVE-2019-13115</a><br><a href="https://blog.semmle.com/libssh2-integer-overflow/">https://blog.semmle.com/libssh2-integer-overflow/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115</a><br><a href="https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa">https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa</a><br><a href="https://github.com/libssh2/libssh2/pull/350">https://github.com/libssh2/libssh2/pull/350</a><br><a href="https://libssh2.org/changes.html">https://libssh2.org/changes.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html">https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/</a><br><a href="https://security.netapp.com/advisory/ntap-20190806-0002/">https://security.netapp.com/advisory/ntap-20190806-0002/</a><br><a href="https://support.f5.com/csp/article/K13322484">https://support.f5.com/csp/article/K13322484</a><br><a href="https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;amp;utm_medium=RSS</a><br></details> |
| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-17498">https://access.redhat.com/security/cve/CVE-2019-17498</a><br><a href="https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/">https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498</a><br><a href="https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498">https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498</a><br><a href="https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480">https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480</a><br><a href="https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c">https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c</a><br><a href="https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94">https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17498.html">https://linux.oracle.com/cve/CVE-2019-17498.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-3915.html">https://linux.oracle.com/errata/ELSA-2020-3915.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">https://nvd.nist.gov/vuln/detail/CVE-2019-17498</a><br></details> |
| libssl1.1 | CVE-2022-2068 | MEDIUM | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-2068">https://access.redhat.com/security/cve/CVE-2022-2068</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7</a><br><a href="https://ubuntu.com/security/notices/USN-5488-1">https://ubuntu.com/security/notices/USN-5488-1</a><br><a href="https://www.openssl.org/news/secadv/20220621.txt">https://www.openssl.org/news/secadv/20220621.txt</a><br></details> |
| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u3 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u3 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-12886">https://access.redhat.com/security/cve/CVE-2018-12886</a><br><a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a><br><a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a><br></details> |
| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-15847">https://access.redhat.com/security/cve/CVE-2019-15847</a><br><a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a><br><a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">https://nvd.nist.gov/vuln/detail/CVE-2019-15847</a><br></details> |
| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | | <details><summary>Expand...</summary><a href="http://www.securityfocus.com/bid/108116">http://www.securityfocus.com/bid/108116</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-3843">https://access.redhat.com/security/cve/CVE-2019-3843</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843</a><br><a href="https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)">https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)</a><br><a href="https://linux.oracle.com/cve/CVE-2019-3843.html">https://linux.oracle.com/cve/CVE-2019-3843.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">https://nvd.nist.gov/vuln/detail/CVE-2019-3843</a><br><a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a><br><a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a><br></details> |
@ -228,9 +227,8 @@ hide:
| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| ncurses-base | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| openssl | CVE-2022-2068 | MEDIUM | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-2068">https://access.redhat.com/security/cve/CVE-2022-2068</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7</a><br><a href="https://ubuntu.com/security/notices/USN-5488-1">https://ubuntu.com/security/notices/USN-5488-1</a><br><a href="https://www.openssl.org/news/secadv/20220621.txt">https://www.openssl.org/news/secadv/20220621.txt</a><br></details> |
| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u3 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u3 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2018-7169">https://access.redhat.com/security/cve/CVE-2018-7169</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169</a><br><a href="https://github.com/shadow-maint/shadow/pull/97">https://github.com/shadow-maint/shadow/pull/97</a><br><a href="https://security.gentoo.org/glsa/201805-09">https://security.gentoo.org/glsa/201805-09</a><br><a href="https://ubuntu.com/security/notices/USN-5254-1">https://ubuntu.com/security/notices/USN-5254-1</a><br></details> |

View File

@ -1,10 +0,0 @@
# Changelog<br>
<a name="privatebin-0.0.1"></a>
### privatebin-0.0.1 (2022-06-27)
#### Feat
* Add PrivateBin to incubator ([#2971](https://github.com/truecharts/apps/issues/2971))

View File

@ -0,0 +1,18 @@
# Changelog<br>
<a name="privatebin-0.0.2"></a>
### [privatebin-0.0.2](https://github.com/truecharts/apps/compare/privatebin-0.0.1...privatebin-0.0.2) (2022-06-27)
#### Chore
* update docker general non-major ([#2999](https://github.com/truecharts/apps/issues/2999))
<a name="privatebin-0.0.1"></a>
### privatebin-0.0.1 (2022-06-27)
#### Feat
* Add PrivateBin to incubator ([#2971](https://github.com/truecharts/apps/issues/2971))

View File

@ -6,4 +6,4 @@ dependencies:
repository: https://charts.truecharts.org/
version: 8.0.18
digest: sha256:c637d0fd843751135dc774a2abb21a64ad838e6aa812126622d372989298bef4
generated: "2022-06-27T09:45:28.066376935Z"
generated: "2022-06-27T16:19:59.929830497Z"

View File

@ -26,7 +26,7 @@ sources:
- https://github.com/PrivateBin/PrivateBin
- https://hub.docker.com/r/privatebin/pdo
type: application
version: 0.0.1
version: 0.0.2
annotations:
truecharts.org/catagories: |
- productivity

View File

@ -1,7 +1,7 @@
image:
repository: privatebin/pdo
pullPolicy: IfNotPresent
tag: 1.4.0@sha256:5fe4b94286dcadbd0e576418f619205463030754e257863ec430eb7eb3e957fd
tag: 1.4.0@sha256:9602cf1434bd95b5db02a4d9039e5521e25944c7481c1d0d206678e23eb4f6b0
podSecurityContext:
runAsUser: 65534

View File

@ -12,9 +12,9 @@ hide:
##### Scan Results
#### Chart Object: privatebin/charts/postgresql/templates/common.yaml
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;RELEASE-NAME-postgresql&#39; of StatefulSet &#39;RELEASE-NAME-postgresql&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv001">https://avd.aquasec.com/misconfig/ksv001</a><br></details> |
@ -35,7 +35,7 @@ hide:
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | <details><summary>Expand...</summary> Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. <br> <hr> <br> container should drop all </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv106">https://avd.aquasec.com/misconfig/ksv106</a><br></details> |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | <details><summary>Expand...</summary> Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. <br> <hr> <br> container should drop all </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv106">https://avd.aquasec.com/misconfig/ksv106</a><br></details> |
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;RELEASE-NAME-privatebin&#39; of Deployment &#39;RELEASE-NAME-privatebin&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv001">https://avd.aquasec.com/misconfig/ksv001</a><br></details> |
@ -67,7 +67,7 @@ hide:
tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730
tccr.io/truecharts/postgresql:v14.4.0@sha256:569f358a5e8fa89564c68625fedc5d9b60580bac3a2e49169faeba23429e55ea
privatebin/pdo:1.4.0@sha256:5fe4b94286dcadbd0e576418f619205463030754e257863ec430eb7eb3e957fd
privatebin/pdo:1.4.0@sha256:9602cf1434bd95b5db02a4d9039e5521e25944c7481c1d0d206678e23eb4f6b0
tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730
tccr.io/truecharts/postgresql:v14.4.0@sha256:9f88fe352b51208f9a8fa01a95c07a74751e72629d009230cfe18a427e30550c
@ -75,23 +75,23 @@ hide:
#### Container: tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730 (alpine 3.16.0)
**alpine**
| No Vulnerabilities found |
|:---------------------------------|
#### Container: tccr.io/truecharts/postgresql:v14.4.0@sha256:569f358a5e8fa89564c68625fedc5d9b60580bac3a2e49169faeba23429e55ea (debian 11.3)
**debian**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| apt | CVE-2011-3374 | LOW | 2.2.4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a><br><a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a><br><a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a><br><a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a><br></details> |
@ -225,15 +225,15 @@ hide:
**jar**
| No Vulnerabilities found |
|:---------------------------------|
**gobinary**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| github.com/opencontainers/runc | CVE-2022-29162 | HIGH | v1.0.1 | v1.1.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29162">https://access.redhat.com/security/cve/CVE-2022-29162</a><br><a href="https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5">https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5</a><br><a href="https://github.com/opencontainers/runc/releases/tag/v1.1.2">https://github.com/opencontainers/runc/releases/tag/v1.1.2</a><br><a href="https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66">https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">https://nvd.nist.gov/vuln/detail/CVE-2022-29162</a><br></details> |
@ -241,12 +241,12 @@ hide:
| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/05/12/1">http://www.openwall.com/lists/oss-security/2022/05/12/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-24769">https://access.redhat.com/security/cve/CVE-2022-24769</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769</a><br><a href="https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c">https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c</a><br><a href="https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f">https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f</a><br><a href="https://github.com/moby/moby/releases/tag/v20.10.14">https://github.com/moby/moby/releases/tag/v20.10.14</a><br><a href="https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq">https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">https://nvd.nist.gov/vuln/detail/CVE-2022-24769</a><br><a href="https://www.debian.org/security/2022/dsa-5162">https://www.debian.org/security/2022/dsa-5162</a><br></details> |
#### Container: privatebin/pdo:1.4.0@sha256:5fe4b94286dcadbd0e576418f619205463030754e257863ec430eb7eb3e957fd (alpine 3.16.0)
#### Container: privatebin/pdo:1.4.0@sha256:9602cf1434bd95b5db02a4d9039e5521e25944c7481c1d0d206678e23eb4f6b0 (alpine 3.16.0)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| pcre2 | CVE-2022-1586 | CRITICAL | 10.39-r0 | 10.40-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1586">https://access.redhat.com/security/cve/CVE-2022-1586</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2077976,">https://bugzilla.redhat.com/show_bug.cgi?id=2077976,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,">https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c">https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">https://nvd.nist.gov/vuln/detail/CVE-2022-1586</a><br></details> |
@ -254,31 +254,31 @@ hide:
**node-pkg**
| No Vulnerabilities found |
|:---------------------------------|
#### Container: tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730 (alpine 3.16.0)
**alpine**
| No Vulnerabilities found |
|:---------------------------------|
#### Container: tccr.io/truecharts/postgresql:v14.4.0@sha256:9f88fe352b51208f9a8fa01a95c07a74751e72629d009230cfe18a427e30550c (debian 11.3)
**debian**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| apt | CVE-2011-3374 | LOW | 2.2.4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a><br><a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a><br><a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a><br><a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a><br><a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a><br></details> |
@ -412,18 +412,17 @@ hide:
**jar**
| No Vulnerabilities found |
|:---------------------------------|
**gobinary**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| github.com/opencontainers/runc | CVE-2022-29162 | HIGH | v1.0.1 | v1.1.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29162">https://access.redhat.com/security/cve/CVE-2022-29162</a><br><a href="https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5">https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5</a><br><a href="https://github.com/opencontainers/runc/releases/tag/v1.1.2">https://github.com/opencontainers/runc/releases/tag/v1.1.2</a><br><a href="https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66">https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">https://nvd.nist.gov/vuln/detail/CVE-2022-29162</a><br></details> |
| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43784">https://access.redhat.com/security/cve/CVE-2021-43784</a><br><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2241">https://bugs.chromium.org/p/project-zero/issues/detail?id=2241</a><br><a href="https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554">https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554</a><br><a href="https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae">https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae</a><br><a href="https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed">https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed</a><br><a href="https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f">https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43784">https://nvd.nist.gov/vuln/detail/CVE-2021-43784</a><br></details> |
| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/05/12/1">http://www.openwall.com/lists/oss-security/2022/05/12/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-24769">https://access.redhat.com/security/cve/CVE-2022-24769</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769</a><br><a href="https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c">https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c</a><br><a href="https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f">https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f</a><br><a href="https://github.com/moby/moby/releases/tag/v20.10.14">https://github.com/moby/moby/releases/tag/v20.10.14</a><br><a href="https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq">https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">https://nvd.nist.gov/vuln/detail/CVE-2022-24769</a><br><a href="https://www.debian.org/security/2022/dsa-5162">https://www.debian.org/security/2022/dsa-5162</a><br></details> |

View File

@ -1,4 +0,0 @@
image:
repository: tccr.io/truecharts/jackett
pullPolicy: IfNotPresent
tag: v0.20.1226@sha256:a994370a4dcb0b88fe39e9f0f42965803381af5ef1638655874ed0ba290e450c

View File

@ -1,6 +1,15 @@
# Changelog<br>
<a name="custom-app-5.1.1"></a>
### [custom-app-5.1.1](https://github.com/truecharts/apps/compare/custom-app-5.1.0...custom-app-5.1.1) (2022-06-27)
#### Chore
* update docker general non-major ([#2999](https://github.com/truecharts/apps/issues/2999))
<a name="custom-app-5.1.0"></a>
### [custom-app-5.1.0](https://github.com/truecharts/apps/compare/custom-app-5.0.16...custom-app-5.1.0) (2022-06-27)
@ -88,12 +97,3 @@
### [custom-app-5.0.8](https://github.com/truecharts/apps/compare/custom-app-5.0.7...custom-app-5.0.8) (2022-06-14)
#### Chore
* update helm general non-major helm releases ([#2886](https://github.com/truecharts/apps/issues/2886))
<a name="custom-app-5.0.7"></a>
### [custom-app-5.0.7](https://github.com/truecharts/apps/compare/custom-app-5.0.6...custom-app-5.0.7) (2022-06-14)
#### Chore

View File

@ -3,4 +3,4 @@ dependencies:
repository: https://library-charts.truecharts.org
version: 10.1.4
digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2
generated: "2022-06-25T06:41:09.293394176Z"
generated: "2022-06-27T16:19:54.297037873Z"

View File

@ -1,5 +1,5 @@
apiVersion: v2
appVersion: "0.20.1226"
appVersion: "0.20.1246"
dependencies:
- name: common
repository: https://library-charts.truecharts.org
@ -19,7 +19,7 @@ name: custom-app
sources:
- https://github.com/truecharts/apps/tree/master/charts/stable/custom-app
type: application
version: 5.1.0
version: 5.1.1
annotations:
truecharts.org/catagories: |
- custom

View File

@ -1,7 +1,7 @@
image:
repository: tccr.io/truecharts/jackett
pullPolicy: IfNotPresent
tag: v0.20.1226@sha256:a994370a4dcb0b88fe39e9f0f42965803381af5ef1638655874ed0ba290e450c
tag: v0.20.1246@sha256:b0d890621102e7328336b89ad87efc62ef52d4eef0d8a18f0d8a3f0ee28d4092
securityContext:
readOnlyRootFilesystem: false

View File

@ -0,0 +1,4 @@
image:
repository: tccr.io/truecharts/jackett
pullPolicy: IfNotPresent
tag: v0.20.1246@sha256:b0d890621102e7328336b89ad87efc62ef52d4eef0d8a18f0d8a3f0ee28d4092

View File

@ -39,7 +39,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730
tccr.io/truecharts/jackett:v0.20.1226@sha256:a994370a4dcb0b88fe39e9f0f42965803381af5ef1638655874ed0ba290e450c
tccr.io/truecharts/jackett:v0.20.1246@sha256:b0d890621102e7328336b89ad87efc62ef52d4eef0d8a18f0d8a3f0ee28d4092
##### Scan Results
@ -56,7 +56,7 @@ hide:
#### Container: tccr.io/truecharts/jackett:v0.20.1226@sha256:a994370a4dcb0b88fe39e9f0f42965803381af5ef1638655874ed0ba290e450c (ubuntu 20.04)
#### Container: tccr.io/truecharts/jackett:v0.20.1246@sha256:b0d890621102e7328336b89ad87efc62ef52d4eef0d8a18f0d8a3f0ee28d4092 (ubuntu 20.04)
**ubuntu**

View File

@ -1,6 +1,15 @@
# Changelog<br>
<a name="cyberchef-2.0.16"></a>
### [cyberchef-2.0.16](https://github.com/truecharts/apps/compare/cyberchef-2.0.15...cyberchef-2.0.16) (2022-06-27)
#### Chore
* update docker general non-major ([#2999](https://github.com/truecharts/apps/issues/2999))
<a name="cyberchef-2.0.15"></a>
### [cyberchef-2.0.15](https://github.com/truecharts/apps/compare/cyberchef-2.0.14...cyberchef-2.0.15) (2022-06-26)
@ -88,12 +97,3 @@
### [cyberchef-2.0.6](https://github.com/truecharts/apps/compare/cyberchef-2.0.5...cyberchef-2.0.6) (2022-06-14)
#### Chore
* update helm general non-major helm releases ([#2886](https://github.com/truecharts/apps/issues/2886))
<a name="cyberchef-2.0.5"></a>
### [cyberchef-2.0.5](https://github.com/truecharts/apps/compare/cyberchef-2.0.4...cyberchef-2.0.5) (2022-06-13)
#### Chore

View File

@ -3,4 +3,4 @@ dependencies:
repository: https://library-charts.truecharts.org
version: 10.1.4
digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2
generated: "2022-06-27T09:45:23.151375959Z"
generated: "2022-06-27T16:19:54.258302521Z"

View File

@ -17,7 +17,7 @@ maintainers:
name: cyberchef
sources:
- https://hub.docker.com/r/mpepping/cyberchef
version: 2.0.15
version: 2.0.16
annotations:
truecharts.org/catagories: |
- utilities

View File

@ -1,6 +1,6 @@
image:
repository: tccr.io/truecharts/cyberchef
tag: v9.39.1@sha256:ab0169374a32f43a51df0b1938ecafeb065a3232ac47b6300e5a5788a7be75ef
tag: v9.39.1@sha256:64eb0bab8901ece060180ba0889393f001e6b8c8123bcb7476c202a7c3423f29
pullPolicy: IfNotPresent
securityContext:

View File

@ -42,7 +42,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730
tccr.io/truecharts/cyberchef:v9.39.1@sha256:ab0169374a32f43a51df0b1938ecafeb065a3232ac47b6300e5a5788a7be75ef
tccr.io/truecharts/cyberchef:v9.39.1@sha256:64eb0bab8901ece060180ba0889393f001e6b8c8123bcb7476c202a7c3423f29
##### Scan Results
@ -59,7 +59,7 @@ hide:
#### Container: tccr.io/truecharts/cyberchef:v9.39.1@sha256:ab0169374a32f43a51df0b1938ecafeb065a3232ac47b6300e5a5788a7be75ef (alpine 3.16.0)
#### Container: tccr.io/truecharts/cyberchef:v9.39.1@sha256:64eb0bab8901ece060180ba0889393f001e6b8c8123bcb7476c202a7c3423f29 (alpine 3.16.0)
**alpine**

View File

@ -1,6 +1,15 @@
# Changelog<br>
<a name="dashdot-1.0.6"></a>
### [dashdot-1.0.6](https://github.com/truecharts/apps/compare/dashdot-1.0.5...dashdot-1.0.6) (2022-06-27)
#### Chore
* update docker general non-major ([#2999](https://github.com/truecharts/apps/issues/2999))
<a name="dashdot-1.0.5"></a>
### [dashdot-1.0.5](https://github.com/truecharts/apps/compare/dashdot-1.0.4...dashdot-1.0.5) (2022-06-26)
@ -88,12 +97,3 @@
#### Fix
* run privileged ([#2901](https://github.com/truecharts/apps/issues/2901))
<a name="dashdot-0.0.3"></a>
### [dashdot-0.0.3](https://github.com/truecharts/apps/compare/dashdot-0.0.2...dashdot-0.0.3) (2022-06-15)
#### Fix

View File

@ -3,4 +3,4 @@ dependencies:
repository: https://library-charts.truecharts.org
version: 10.1.4
digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2
generated: "2022-06-26T20:12:40.522678146Z"
generated: "2022-06-27T16:20:23.924363189Z"

View File

@ -1,5 +1,5 @@
apiVersion: v2
appVersion: "3.8.1"
appVersion: "3.8.2"
dependencies:
- name: common
repository: https://library-charts.truecharts.org
@ -19,7 +19,7 @@ name: dashdot
sources:
- https://github.com/MauriceNino/dashdot
- https://hub.docker.com/r/mauricenino/dashdot
version: 1.0.5
version: 1.0.6
annotations:
truecharts.org/catagories: |
- media

View File

@ -1,6 +1,6 @@
image:
repository: tccr.io/truecharts/dashdot
tag: v3.8.1@sha256:1ec271243ec30224d5ac22a3c83151646404c38ab3ab476971cdfdeaa07fd35b
tag: v3.8.2@sha256:7547f520380aeddfda4b7b4195c483c60641caba149bc8896416dd104c899ae5
pullPolicy: IfNotPresent
securityContext:

View File

@ -46,7 +46,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730
tccr.io/truecharts/dashdot:v3.8.1@sha256:1ec271243ec30224d5ac22a3c83151646404c38ab3ab476971cdfdeaa07fd35b
tccr.io/truecharts/dashdot:v3.8.2@sha256:7547f520380aeddfda4b7b4195c483c60641caba149bc8896416dd104c899ae5
##### Scan Results
@ -63,7 +63,7 @@ hide:
#### Container: tccr.io/truecharts/dashdot:v3.8.1@sha256:1ec271243ec30224d5ac22a3c83151646404c38ab3ab476971cdfdeaa07fd35b (alpine 3.16.0)
#### Container: tccr.io/truecharts/dashdot:v3.8.2@sha256:7547f520380aeddfda4b7b4195c483c60641caba149bc8896416dd104c899ae5 (alpine 3.16.0)
**alpine**

View File

@ -1,6 +0,0 @@
dependencies:
- name: common
repository: https://library-charts.truecharts.org
version: 10.1.4
digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2
generated: "2022-06-25T13:30:57.010555365Z"

View File

@ -1,6 +1,15 @@
# Changelog<br>
<a name="grafana-4.0.14"></a>
### [grafana-4.0.14](https://github.com/truecharts/apps/compare/grafana-4.0.13...grafana-4.0.14) (2022-06-27)
#### Chore
* update docker general non-major ([#2999](https://github.com/truecharts/apps/issues/2999))
<a name="grafana-4.0.13"></a>
### [grafana-4.0.13](https://github.com/truecharts/apps/compare/grafana-4.0.12...grafana-4.0.13) (2022-06-25)
@ -88,12 +97,3 @@
#### Chore
* update docker general non-major ([#2848](https://github.com/truecharts/apps/issues/2848))
<a name="grafana-4.0.3"></a>
### [grafana-4.0.3](https://github.com/truecharts/apps/compare/grafana-4.0.2...grafana-4.0.3) (2022-06-09)
#### Chore

View File

@ -0,0 +1,6 @@
dependencies:
- name: common
repository: https://library-charts.truecharts.org
version: 10.1.4
digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2
generated: "2022-06-27T16:20:37.43114948Z"

View File

@ -23,7 +23,7 @@ sources:
- https://github.com/bitnami/bitnami-docker-grafana
- https://grafana.com/
type: application
version: 4.0.13
version: 4.0.14
annotations:
truecharts.org/catagories: |
- metrics

View File

@ -1,7 +1,7 @@
image:
repository: tccr.io/truecharts/grafana
pullPolicy: IfNotPresent
tag: v8.5.6@sha256:2f54534db777d36858962ee1bc3be678b6be5790517cb66af47cbd4740ca0bdd
tag: v8.5.6@sha256:c42edef6e5eac3ee17d57838f3ff29853f8ecdec295d317375488916828c0759
securityContext:
readOnlyRootFilesystem: false

View File

@ -40,7 +40,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730
tccr.io/truecharts/grafana:v8.5.6@sha256:2f54534db777d36858962ee1bc3be678b6be5790517cb66af47cbd4740ca0bdd
tccr.io/truecharts/grafana:v8.5.6@sha256:c42edef6e5eac3ee17d57838f3ff29853f8ecdec295d317375488916828c0759
##### Scan Results
@ -57,7 +57,7 @@ hide:
#### Container: tccr.io/truecharts/grafana:v8.5.6@sha256:2f54534db777d36858962ee1bc3be678b6be5790517cb66af47cbd4740ca0bdd (debian 11.3)
#### Container: tccr.io/truecharts/grafana:v8.5.6@sha256:c42edef6e5eac3ee17d57838f3ff29853f8ecdec295d317375488916828c0759 (debian 11.3)
**debian**
@ -155,9 +155,8 @@ hide:
| libsepol1 | CVE-2021-36086 | LOW | 3.1-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36086">https://access.redhat.com/security/cve/CVE-2021-36086</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4513.html">https://errata.almalinux.org/8/ALSA-2021-4513.html</a><br><a href="https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8">https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36086.html">https://linux.oracle.com/cve/CVE-2021-36086.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://ubuntu.com/security/notices/USN-5391-1">https://ubuntu.com/security/notices/USN-5391-1</a><br></details> |
| libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36087">https://access.redhat.com/security/cve/CVE-2021-36087</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4513.html">https://errata.almalinux.org/8/ALSA-2021-4513.html</a><br><a href="https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521">https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521</a><br><a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36087.html">https://linux.oracle.com/cve/CVE-2021-36087.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4513.html">https://linux.oracle.com/errata/ELSA-2021-4513.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/</a><br><a href="https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/">https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/</a><br><a href="https://ubuntu.com/security/notices/USN-5391-1">https://ubuntu.com/security/notices/USN-5391-1</a><br></details> |
| libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| libssl1.1 | CVE-2022-2068 | MEDIUM | 1.1.1n-0+deb11u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-2068">https://access.redhat.com/security/cve/CVE-2022-2068</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7</a><br><a href="https://ubuntu.com/security/notices/USN-5488-1">https://ubuntu.com/security/notices/USN-5488-1</a><br><a href="https://www.openssl.org/news/secadv/20220621.txt">https://www.openssl.org/news/secadv/20220621.txt</a><br></details> |
| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u3 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u3 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | | <details><summary>Expand...</summary><a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a><br><a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a><br><a href="https://access.redhat.com/security/cve/CVE-2013-4392">https://access.redhat.com/security/cve/CVE-2013-4392</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a><br></details> |
| libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13529">https://access.redhat.com/security/cve/CVE-2020-13529</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13529.html">https://linux.oracle.com/cve/CVE-2020-13529.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4361.html">https://linux.oracle.com/errata/ELSA-2021-4361.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a><br><a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0005/">https://security.netapp.com/advisory/ntap-20210625-0005/</a><br><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a><br><a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a><br><a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a><br></details> |
| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
@ -171,9 +170,8 @@ hide:
| mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| openssl | CVE-2022-2068 | MEDIUM | 1.1.1n-0+deb11u2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-2068">https://access.redhat.com/security/cve/CVE-2022-2068</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7</a><br><a href="https://ubuntu.com/security/notices/USN-5488-1">https://ubuntu.com/security/notices/USN-5488-1</a><br><a href="https://www.openssl.org/news/secadv/20220621.txt">https://www.openssl.org/news/secadv/20220621.txt</a><br></details> |
| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u3 | | <details><summary>Expand...</summary><a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a><br><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a><br><a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a><br><a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a><br><a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a><br><a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a><br><a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a><br><a href="https://access.redhat.com/security/cve/CVE-2007-6755">https://access.redhat.com/security/cve/CVE-2007-6755</a><br><a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a><br></details> |
| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u3 | | <details><summary>Expand...</summary><a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a><br><a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a><br><a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a><br><a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a><br><a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a><br><a href="https://access.redhat.com/security/cve/CVE-2010-0928">https://access.redhat.com/security/cve/CVE-2010-0928</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a><br></details> |
| passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19882">https://access.redhat.com/security/cve/CVE-2019-19882</a><br><a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a><br><a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a><br><a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a><br><a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a><br><a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a><br><a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a><br></details> |

View File

@ -0,0 +1,99 @@
# Changelog<br>
<a name="jackett-11.0.17"></a>
### [jackett-11.0.17](https://github.com/truecharts/apps/compare/jackett-11.0.16...jackett-11.0.17) (2022-06-27)
#### Chore
* update docker general non-major ([#2999](https://github.com/truecharts/apps/issues/2999))
<a name="jackett-11.0.16"></a>
### [jackett-11.0.16](https://github.com/truecharts/apps/compare/jackett-11.0.15...jackett-11.0.16) (2022-06-26)
#### Chore
* update docker general non-major ([#2988](https://github.com/truecharts/apps/issues/2988))
<a name="jackett-11.0.15"></a>
### [jackett-11.0.15](https://github.com/truecharts/apps/compare/jackett-11.0.14...jackett-11.0.15) (2022-06-25)
#### Chore
* update helm general non-major helm releases ([#2977](https://github.com/truecharts/apps/issues/2977))
<a name="jackett-11.0.14"></a>
### [jackett-11.0.14](https://github.com/truecharts/apps/compare/jackett-11.0.13...jackett-11.0.14) (2022-06-25)
#### Chore
* update docker general non-major ([#2960](https://github.com/truecharts/apps/issues/2960))
<a name="jackett-11.0.13"></a>
### [jackett-11.0.13](https://github.com/truecharts/apps/compare/jackett-11.0.12...jackett-11.0.13) (2022-06-22)
#### Chore
* update docker general non-major ([#2954](https://github.com/truecharts/apps/issues/2954))
* update helm general non-major helm releases ([#2948](https://github.com/truecharts/apps/issues/2948))
<a name="jackett-11.0.12"></a>
### [jackett-11.0.12](https://github.com/truecharts/apps/compare/jackett-11.0.11...jackett-11.0.12) (2022-06-21)
#### Chore
* update helm general non-major helm releases ([#2943](https://github.com/truecharts/apps/issues/2943))
* update docker general non-major ([#2931](https://github.com/truecharts/apps/issues/2931))
<a name="jackett-11.0.11"></a>
### [jackett-11.0.11](https://github.com/truecharts/apps/compare/jackett-11.0.10...jackett-11.0.11) (2022-06-17)
#### Chore
* update docker general non-major ([#2917](https://github.com/truecharts/apps/issues/2917))
<a name="jackett-11.0.10"></a>
### [jackett-11.0.10](https://github.com/truecharts/apps/compare/jackett-11.0.9...jackett-11.0.10) (2022-06-16)
#### Chore
* update docker general non-major ([#2904](https://github.com/truecharts/apps/issues/2904))
<a name="jackett-11.0.9"></a>
### [jackett-11.0.9](https://github.com/truecharts/apps/compare/jackett-11.0.8...jackett-11.0.9) (2022-06-15)
#### Chore
* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890))
<a name="jackett-11.0.8"></a>
### [jackett-11.0.8](https://github.com/truecharts/apps/compare/jackett-11.0.7...jackett-11.0.8) (2022-06-14)
#### Chore
* update helm general non-major helm releases ([#2886](https://github.com/truecharts/apps/issues/2886))
<a name="jackett-11.0.7"></a>
### [jackett-11.0.7](https://github.com/truecharts/apps/compare/jackett-11.0.6...jackett-11.0.7) (2022-06-14)
#### Chore

View File

@ -0,0 +1,7 @@
# Configuration Options
##### Connecting to other apps
If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide.
##### Available config options
In the future this page is going to contain an automated list of options available in the installation/edit UI.

View File

@ -0,0 +1,6 @@
dependencies:
- name: common
repository: https://library-charts.truecharts.org
version: 10.1.4
digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2
generated: "2022-06-27T16:20:54.018319981Z"

View File

@ -0,0 +1,30 @@
apiVersion: v2
appVersion: "0.20.1246"
dependencies:
- name: common
repository: https://library-charts.truecharts.org
version: 10.1.4
deprecated: false
description: API Support for your favorite torrent trackers.
home: https://github.com/truecharts/apps/tree/master/charts/stable/jackett
icon: https://truecharts.org/_static/img/appicons/jackett.png
keywords:
- jackett
- torrent
- usenet
kubeVersion: '>=1.16.0-0'
maintainers:
- email: info@truecharts.org
name: TrueCharts
url: https://truecharts.org
name: jackett
sources:
- https://github.com/Jackett/Jackett
type: application
version: 11.0.17
annotations:
truecharts.org/catagories: |
- media
- test
truecharts.org/SCALE-support: "true"
truecharts.org/grade: U

View File

@ -0,0 +1,37 @@
# Introduction
API Support for your favorite torrent trackers.
TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation.
**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)**
## Source Code
* <https://github.com/Jackett/Jackett>
## Requirements
Kubernetes: `>=1.16.0-0`
## Dependencies
| Repository | Name | Version |
|------------|------|---------|
| https://library-charts.truecharts.org | common | 10.1.4 |
## Installing the Chart
To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/).
## Upgrading, Rolling Back and Uninstalling the Chart
To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/).
## Support
- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first.
- See the [Wiki](https://truecharts.org)
- Check our [Discord](https://discord.gg/tVsPTHWTtr)
- Open a [issue](https://github.com/truecharts/apps/issues/new/choose)
---
All Rights Reserved - The TrueCharts Project

View File

@ -0,0 +1,3 @@
API Support for your favorite torrent trackers.
This App is supplied by TrueCharts, for more information please visit https://truecharts.org

Binary file not shown.

View File

@ -0,0 +1,27 @@
# Default Helm-Values
TrueCharts is primarily build to supply TrueNAS SCALE Apps.
However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file.
Most of our Apps also consume our "common" Helm Chart.
If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart.
You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document.
## Values
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/jackett"` | |
| image.tag | string | `"v0.20.781@sha256:96eae64bdf60250418ef7581fa5387c58b2c5963be19582ebc4151ccacc7c488"` | |
| persistence.config.enabled | bool | `true` | |
| persistence.config.mountPath | string | `"/config"` | |
| probes.liveness.path | string | `"/UI/Login"` | |
| probes.readiness.path | string | `"/UI/Login"` | |
| probes.startup.path | string | `"/UI/Login"` | |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
| service.main.ports.main.port | int | `9117` | |
| service.main.ports.main.targetPort | int | `9117` | |
| service.main.protocol | string | `"HTTP"` | |
All Rights Reserved - The TrueCharts Project

View File

@ -0,0 +1,30 @@
image:
repository: tccr.io/truecharts/jackett
pullPolicy: IfNotPresent
tag: v0.20.1246@sha256:b0d890621102e7328336b89ad87efc62ef52d4eef0d8a18f0d8a3f0ee28d4092
securityContext:
readOnlyRootFilesystem: false
service:
main:
protocol: HTTP
ports:
main:
targetPort: 9117
port: 9117
probes:
liveness:
path: "/UI/Login"
readiness:
path: "/UI/Login"
startup:
path: "/UI/Login"
persistence:
config:
enabled: true
mountPath: "/config"

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,237 @@
---
hide:
- toc
---
# Security Overview
<link href="https://truecharts.org/_static/trivy.css" type="text/css" rel="stylesheet" />
## Helm-Chart
##### Scan Results
#### Chart Object: jackett/templates/common.yaml
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;RELEASE-NAME-jackett&#39; of Deployment &#39;RELEASE-NAME-jackett&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv001">https://avd.aquasec.com/misconfig/ksv001</a><br></details> |
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-jackett&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv001">https://avd.aquasec.com/misconfig/ksv001</a><br></details> |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;RELEASE-NAME-jackett&#39; of Deployment &#39;RELEASE-NAME-jackett&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/misconfig/ksv003">https://avd.aquasec.com/misconfig/ksv003</a><br></details> |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-jackett&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/misconfig/ksv003">https://avd.aquasec.com/misconfig/ksv003</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-jackett&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv012">https://avd.aquasec.com/misconfig/ksv012</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;RELEASE-NAME-jackett&#39; of Deployment &#39;RELEASE-NAME-jackett&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/misconfig/ksv014">https://avd.aquasec.com/misconfig/ksv014</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-jackett&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/misconfig/ksv014">https://avd.aquasec.com/misconfig/ksv014</a><br></details> |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | <details><summary>Expand...</summary> Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-jackett&#39; should set &#39;securityContext.privileged&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline">https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href="https://avd.aquasec.com/misconfig/ksv017">https://avd.aquasec.com/misconfig/ksv017</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-jackett&#39; of Deployment &#39;RELEASE-NAME-jackett&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv020">https://avd.aquasec.com/misconfig/ksv020</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-jackett&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv020">https://avd.aquasec.com/misconfig/ksv020</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-jackett&#39; of Deployment &#39;RELEASE-NAME-jackett&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv021">https://avd.aquasec.com/misconfig/ksv021</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;autopermissions&#39; of Deployment &#39;RELEASE-NAME-jackett&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv021">https://avd.aquasec.com/misconfig/ksv021</a><br></details> |
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | <details><summary>Expand...</summary> The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. <br> <hr> <br> Either Pod or Container should set &#39;securityContext.seccompProfile.type&#39; to &#39;RuntimeDefault&#39; </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv030">https://avd.aquasec.com/misconfig/ksv030</a><br></details> |
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | <details><summary>Expand...</summary> The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. <br> <hr> <br> Either Pod or Container should set &#39;securityContext.seccompProfile.type&#39; to &#39;RuntimeDefault&#39; </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv030">https://avd.aquasec.com/misconfig/ksv030</a><br></details> |
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | <details><summary>Expand...</summary> Containers should be forbidden from running with a root UID. <br> <hr> <br> securityContext.runAsUser should be set to a value greater than 0 </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv105">https://avd.aquasec.com/misconfig/ksv105</a><br></details> |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | <details><summary>Expand...</summary> Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. <br> <hr> <br> container should drop all </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv106">https://avd.aquasec.com/misconfig/ksv106</a><br></details> |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | <details><summary>Expand...</summary> Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. <br> <hr> <br> container should drop all </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv106">https://avd.aquasec.com/misconfig/ksv106</a><br></details> |
## Containers
##### Detected Containers
tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730
tccr.io/truecharts/jackett:v0.20.1246@sha256:b0d890621102e7328336b89ad87efc62ef52d4eef0d8a18f0d8a3f0ee28d4092
##### Scan Results
#### Container: tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730 (alpine 3.16.0)
**alpine**
| No Vulnerabilities found |
|:---------------------------------|
#### Container: tccr.io/truecharts/jackett:v0.20.1246@sha256:b0d890621102e7328336b89ad87efc62ef52d4eef0d8a18f0d8a3f0ee28d4092 (ubuntu 20.04)
**ubuntu**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2016/q1/452">http://seclists.org/oss-sec/2016/q1/452</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/2">http://www.openwall.com/lists/oss-security/2016/02/28/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/3">http://www.openwall.com/lists/oss-security/2016/02/28/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2781">https://access.redhat.com/security/cve/CVE-2016-2781</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lore.kernel.org/patchwork/patch/793178/">https://lore.kernel.org/patchwork/patch/793178/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2781">https://nvd.nist.gov/vuln/detail/CVE-2016-2781</a><br></details> |
| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libc-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | <details><summary>Expand...</summary><a href="https://akkadia.org/drepper/SHA-crypt.txt">https://akkadia.org/drepper/SHA-crypt.txt</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013</a><br><a href="https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/">https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/</a><br><a href="https://twitter.com/solardiz/status/795601240151457793">https://twitter.com/solardiz/status/795601240151457793</a><br></details> |
| libc6 | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | <details><summary>Expand...</summary><a href="https://akkadia.org/drepper/SHA-crypt.txt">https://akkadia.org/drepper/SHA-crypt.txt</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013</a><br><a href="https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/">https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/</a><br><a href="https://twitter.com/solardiz/status/795601240151457793">https://twitter.com/solardiz/status/795601240151457793</a><br></details> |
| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43618">https://access.redhat.com/security/cve/CVE-2021-43618</a><br><a href="https://bugs.debian.org/994405">https://bugs.debian.org/994405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618</a><br><a href="https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html">https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html</a><br><a href="https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e">https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">https://nvd.nist.gov/vuln/detail/CVE-2021-43618</a><br></details> |
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libgssapi-krb5-2 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libk5crypto3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1586">https://access.redhat.com/security/cve/CVE-2022-1586</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2077976,">https://bugzilla.redhat.com/show_bug.cgi?id=2077976,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,">https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c">https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">https://nvd.nist.gov/vuln/detail/CVE-2022-1586</a><br></details> |
| libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1587">https://access.redhat.com/security/cve/CVE-2022-1587</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2077983,">https://bugzilla.redhat.com/show_bug.cgi?id=2077983,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0">https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">https://nvd.nist.gov/vuln/detail/CVE-2022-1587</a><br></details> |
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12ubuntu0.1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11164">https://access.redhat.com/security/cve/CVE-2017-11164</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/HT211168">https://support.apple.com/HT211168</a><br><a href="https://support.apple.com/HT211170">https://support.apple.com/HT211170</a><br><a href="https://support.apple.com/HT211171">https://support.apple.com/HT211171</a><br><a href="https://support.apple.com/HT211175">https://support.apple.com/HT211175</a><br><a href="https://support.apple.com/HT211178">https://support.apple.com/HT211178</a><br><a href="https://support.apple.com/HT211179">https://support.apple.com/HT211179</a><br><a href="https://support.apple.com/HT211181">https://support.apple.com/HT211181</a><br><a href="https://vuldb.com/?id.155768">https://vuldb.com/?id.155768</a><br></details> |
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/en-us/HT211843">https://support.apple.com/en-us/HT211843</a><br><a href="https://support.apple.com/en-us/HT211844">https://support.apple.com/en-us/HT211844</a><br><a href="https://support.apple.com/en-us/HT211850">https://support.apple.com/en-us/HT211850</a><br><a href="https://support.apple.com/en-us/HT211931">https://support.apple.com/en-us/HT211931</a><br><a href="https://support.apple.com/en-us/HT211935">https://support.apple.com/en-us/HT211935</a><br><a href="https://support.apple.com/en-us/HT211952">https://support.apple.com/en-us/HT211952</a><br><a href="https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/">https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/</a><br></details> |
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/en-us/HT211843">https://support.apple.com/en-us/HT211843</a><br><a href="https://support.apple.com/en-us/HT211844">https://support.apple.com/en-us/HT211844</a><br><a href="https://support.apple.com/en-us/HT211847">https://support.apple.com/en-us/HT211847</a><br><a href="https://support.apple.com/en-us/HT211850">https://support.apple.com/en-us/HT211850</a><br><a href="https://support.apple.com/en-us/HT211931">https://support.apple.com/en-us/HT211931</a><br><a href="https://support.apple.com/kb/HT211846">https://support.apple.com/kb/HT211846</a><br><a href="https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/">https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/</a><br></details> |
| libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| locales | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | <details><summary>Expand...</summary><a href="https://akkadia.org/drepper/SHA-crypt.txt">https://akkadia.org/drepper/SHA-crypt.txt</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013</a><br><a href="https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/">https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/</a><br><a href="https://twitter.com/solardiz/status/795601240151457793">https://twitter.com/solardiz/status/795601240151457793</a><br></details> |
| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| openssl | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-2068">https://access.redhat.com/security/cve/CVE-2022-2068</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7</a><br><a href="https://ubuntu.com/security/notices/USN-5488-1">https://ubuntu.com/security/notices/USN-5488-1</a><br><a href="https://www.openssl.org/news/secadv/20220621.txt">https://www.openssl.org/news/secadv/20220621.txt</a><br></details> |
| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| vim-common | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4166">https://access.redhat.com/security/cve/CVE-2021-4166</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href="https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035">https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">https://nvd.nist.gov/vuln/detail/CVE-2021-4166</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br></details> |
| vim-common | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4192">https://access.redhat.com/security/cve/CVE-2021-4192</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192</a><br><a href="https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952">https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4192.html">https://linux.oracle.com/cve/CVE-2021-4192.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">https://nvd.nist.gov/vuln/detail/CVE-2021-4192</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0213">https://access.redhat.com/security/cve/CVE-2022-0213</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213</a><br><a href="https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26">https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26</a><br><a href="https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed">https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0261">https://access.redhat.com/security/cve/CVE-2022-0261</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)</a><br><a href="https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82">https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0261.html">https://linux.oracle.com/cve/CVE-2022-0261.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">https://nvd.nist.gov/vuln/detail/CVE-2022-0261</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0318">https://access.redhat.com/security/cve/CVE-2022-0318</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318</a><br><a href="https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc">https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc</a><br><a href="https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08">https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0318.html">https://linux.oracle.com/cve/CVE-2022-0318.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">https://nvd.nist.gov/vuln/detail/CVE-2022-0318</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0319">https://access.redhat.com/security/cve/CVE-2022-0319</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319</a><br><a href="https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9">https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9</a><br><a href="https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b">https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0351">https://access.redhat.com/security/cve/CVE-2022-0351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href="https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161">https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0359">https://access.redhat.com/security/cve/CVE-2022-0359</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href="https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def">https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0359.html">https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0361">https://access.redhat.com/security/cve/CVE-2022-0361</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href="https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b">https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0361.html">https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0368">https://access.redhat.com/security/cve/CVE-2022-0368</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0392">https://access.redhat.com/security/cve/CVE-2022-0392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)</a><br><a href="https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126">https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0392.html">https://linux.oracle.com/cve/CVE-2022-0392.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</a><br></details> |
| vim-common | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0408">https://access.redhat.com/security/cve/CVE-2022-0408</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)</a><br><a href="https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d">https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0413">https://access.redhat.com/security/cve/CVE-2022-0413</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413</a><br><a href="https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a">https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a</a><br><a href="https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38">https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0413.html">https://linux.oracle.com/cve/CVE-2022-0413.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</a><br></details> |
| vim-common | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0417">https://access.redhat.com/security/cve/CVE-2022-0417</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417</a><br><a href="https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a">https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a</a><br><a href="https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a">https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">https://nvd.nist.gov/vuln/detail/CVE-2022-0417</a><br></details> |
| vim-common | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0554">https://access.redhat.com/security/cve/CVE-2022-0554</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554</a><br><a href="https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8">https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8</a><br><a href="https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71">https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">https://nvd.nist.gov/vuln/detail/CVE-2022-0554</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0572">https://access.redhat.com/security/cve/CVE-2022-0572</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)</a><br><a href="https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf">https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">https://nvd.nist.gov/vuln/detail/CVE-2022-0572</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0629">https://access.redhat.com/security/cve/CVE-2022-0629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629</a><br><a href="https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc">https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc</a><br><a href="https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877">https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">https://nvd.nist.gov/vuln/detail/CVE-2022-0629</a><br></details> |
| vim-common | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0685">https://access.redhat.com/security/cve/CVE-2022-0685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)</a><br><a href="https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782">https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">https://nvd.nist.gov/vuln/detail/CVE-2022-0685</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0714">https://access.redhat.com/security/cve/CVE-2022-0714</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)</a><br><a href="https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3">https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">https://nvd.nist.gov/vuln/detail/CVE-2022-0714</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0943">https://access.redhat.com/security/cve/CVE-2022-0943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)</a><br><a href="https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1">https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">https://nvd.nist.gov/vuln/detail/CVE-2022-0943</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1154">https://access.redhat.com/security/cve/CVE-2022-1154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154</a><br><a href="https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5">https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5</a><br><a href="https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425">https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1154.html">https://linux.oracle.com/cve/CVE-2022-1154.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1552.html">https://linux.oracle.com/errata/ELSA-2022-1552.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">https://nvd.nist.gov/vuln/detail/CVE-2022-1154</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1420">https://access.redhat.com/security/cve/CVE-2022-1420</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)</a><br><a href="https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326">https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">https://nvd.nist.gov/vuln/detail/CVE-2022-1420</a><br></details> |
| vim-common | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1616">https://access.redhat.com/security/cve/CVE-2022-1616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)</a><br><a href="https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2">https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">https://nvd.nist.gov/vuln/detail/CVE-2022-1616</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1619">https://access.redhat.com/security/cve/CVE-2022-1619</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619</a><br><a href="https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe">https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe</a><br><a href="https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450">https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">https://nvd.nist.gov/vuln/detail/CVE-2022-1619</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1620">https://access.redhat.com/security/cve/CVE-2022-1620</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620</a><br><a href="https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f">https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f</a><br><a href="https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51">https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">https://nvd.nist.gov/vuln/detail/CVE-2022-1620</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1621">https://access.redhat.com/security/cve/CVE-2022-1621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)</a><br><a href="https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb">https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">https://nvd.nist.gov/vuln/detail/CVE-2022-1621</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1629">https://access.redhat.com/security/cve/CVE-2022-1629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629</a><br><a href="https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd">https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd</a><br><a href="https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee">https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">https://nvd.nist.gov/vuln/detail/CVE-2022-1629</a><br></details> |
| vim-common | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1851">https://access.redhat.com/security/cve/CVE-2022-1851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851</a><br><a href="https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad">https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad</a><br><a href="https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d">https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">https://nvd.nist.gov/vuln/detail/CVE-2022-1851</a><br></details> |
| vim-common | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1927">https://access.redhat.com/security/cve/CVE-2022-1927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)</a><br><a href="https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777">https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| vim-common | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1942">https://access.redhat.com/security/cve/CVE-2022-1942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)</a><br><a href="https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071">https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| vim-common | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1968">https://access.redhat.com/security/cve/CVE-2022-1968</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968</a><br><a href="https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895">https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br></details> |
| vim-common | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3973">https://access.redhat.com/security/cve/CVE-2021-3973</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)</a><br><a href="https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e">https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">https://nvd.nist.gov/vuln/detail/CVE-2021-3973</a><br><a href="https://ubuntu.com/security/notices/USN-5247-1">https://ubuntu.com/security/notices/USN-5247-1</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4193">https://access.redhat.com/security/cve/CVE-2021-4193</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193</a><br><a href="https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b">https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4193.html">https://linux.oracle.com/cve/CVE-2021-4193.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">https://nvd.nist.gov/vuln/detail/CVE-2021-4193</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0443">https://access.redhat.com/security/cve/CVE-2022-0443</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)</a><br><a href="https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51">https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">https://nvd.nist.gov/vuln/detail/CVE-2022-0443</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0729">https://access.redhat.com/security/cve/CVE-2022-0729</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)</a><br><a href="https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea">https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">https://nvd.nist.gov/vuln/detail/CVE-2022-0729</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1733">https://access.redhat.com/security/cve/CVE-2022-1733</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733</a><br><a href="https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813">https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813</a><br><a href="https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a">https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">https://nvd.nist.gov/vuln/detail/CVE-2022-1733</a><br></details> |
| vim-common | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1735">https://access.redhat.com/security/cve/CVE-2022-1735</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735</a><br><a href="https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97">https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97</a><br><a href="https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9">https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">https://nvd.nist.gov/vuln/detail/CVE-2022-1735</a><br></details> |
| vim-common | CVE-2022-1769 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1769">https://access.redhat.com/security/cve/CVE-2022-1769</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1769</a><br><a href="https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4">https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4</a><br><a href="https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c">https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1769">https://nvd.nist.gov/vuln/detail/CVE-2022-1769</a><br></details> |
| vim-common | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1785">https://access.redhat.com/security/cve/CVE-2022-1785</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785</a><br><a href="https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839">https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839</a><br><a href="https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109">https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">https://nvd.nist.gov/vuln/detail/CVE-2022-1785</a><br></details> |
| vim-common | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1796">https://access.redhat.com/security/cve/CVE-2022-1796</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796</a><br><a href="https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5">https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5</a><br><a href="https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e">https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">https://nvd.nist.gov/vuln/detail/CVE-2022-1796</a><br></details> |
| vim-common | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1898">https://access.redhat.com/security/cve/CVE-2022-1898</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898</a><br><a href="https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a">https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a</a><br><a href="https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea">https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">https://nvd.nist.gov/vuln/detail/CVE-2022-1898</a><br></details> |
| vim-tiny | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4166">https://access.redhat.com/security/cve/CVE-2021-4166</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href="https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035">https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">https://nvd.nist.gov/vuln/detail/CVE-2021-4166</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br></details> |
| vim-tiny | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4192">https://access.redhat.com/security/cve/CVE-2021-4192</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192</a><br><a href="https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952">https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4192.html">https://linux.oracle.com/cve/CVE-2021-4192.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">https://nvd.nist.gov/vuln/detail/CVE-2021-4192</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0213">https://access.redhat.com/security/cve/CVE-2022-0213</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213</a><br><a href="https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26">https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26</a><br><a href="https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed">https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0261">https://access.redhat.com/security/cve/CVE-2022-0261</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)</a><br><a href="https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82">https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0261.html">https://linux.oracle.com/cve/CVE-2022-0261.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">https://nvd.nist.gov/vuln/detail/CVE-2022-0261</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0318">https://access.redhat.com/security/cve/CVE-2022-0318</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318</a><br><a href="https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc">https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc</a><br><a href="https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08">https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0318.html">https://linux.oracle.com/cve/CVE-2022-0318.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">https://nvd.nist.gov/vuln/detail/CVE-2022-0318</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0319">https://access.redhat.com/security/cve/CVE-2022-0319</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319</a><br><a href="https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9">https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9</a><br><a href="https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b">https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0351">https://access.redhat.com/security/cve/CVE-2022-0351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href="https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161">https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0359">https://access.redhat.com/security/cve/CVE-2022-0359</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href="https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def">https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0359.html">https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0361">https://access.redhat.com/security/cve/CVE-2022-0361</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href="https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b">https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0361.html">https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0368">https://access.redhat.com/security/cve/CVE-2022-0368</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0392">https://access.redhat.com/security/cve/CVE-2022-0392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)</a><br><a href="https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126">https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0392.html">https://linux.oracle.com/cve/CVE-2022-0392.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</a><br></details> |
| vim-tiny | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0408">https://access.redhat.com/security/cve/CVE-2022-0408</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)</a><br><a href="https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d">https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0413">https://access.redhat.com/security/cve/CVE-2022-0413</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413</a><br><a href="https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a">https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a</a><br><a href="https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38">https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0413.html">https://linux.oracle.com/cve/CVE-2022-0413.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</a><br></details> |
| vim-tiny | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0417">https://access.redhat.com/security/cve/CVE-2022-0417</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417</a><br><a href="https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a">https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a</a><br><a href="https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a">https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">https://nvd.nist.gov/vuln/detail/CVE-2022-0417</a><br></details> |
| vim-tiny | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0554">https://access.redhat.com/security/cve/CVE-2022-0554</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554</a><br><a href="https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8">https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8</a><br><a href="https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71">https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">https://nvd.nist.gov/vuln/detail/CVE-2022-0554</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0572">https://access.redhat.com/security/cve/CVE-2022-0572</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)</a><br><a href="https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf">https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">https://nvd.nist.gov/vuln/detail/CVE-2022-0572</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0629">https://access.redhat.com/security/cve/CVE-2022-0629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629</a><br><a href="https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc">https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc</a><br><a href="https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877">https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">https://nvd.nist.gov/vuln/detail/CVE-2022-0629</a><br></details> |
| vim-tiny | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0685">https://access.redhat.com/security/cve/CVE-2022-0685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)</a><br><a href="https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782">https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">https://nvd.nist.gov/vuln/detail/CVE-2022-0685</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0714">https://access.redhat.com/security/cve/CVE-2022-0714</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)</a><br><a href="https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3">https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">https://nvd.nist.gov/vuln/detail/CVE-2022-0714</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0943">https://access.redhat.com/security/cve/CVE-2022-0943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)</a><br><a href="https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1">https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">https://nvd.nist.gov/vuln/detail/CVE-2022-0943</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1154">https://access.redhat.com/security/cve/CVE-2022-1154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154</a><br><a href="https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5">https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5</a><br><a href="https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425">https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1154.html">https://linux.oracle.com/cve/CVE-2022-1154.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1552.html">https://linux.oracle.com/errata/ELSA-2022-1552.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">https://nvd.nist.gov/vuln/detail/CVE-2022-1154</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1420">https://access.redhat.com/security/cve/CVE-2022-1420</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)</a><br><a href="https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326">https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">https://nvd.nist.gov/vuln/detail/CVE-2022-1420</a><br></details> |
| vim-tiny | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1616">https://access.redhat.com/security/cve/CVE-2022-1616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)</a><br><a href="https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2">https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">https://nvd.nist.gov/vuln/detail/CVE-2022-1616</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1619">https://access.redhat.com/security/cve/CVE-2022-1619</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619</a><br><a href="https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe">https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe</a><br><a href="https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450">https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">https://nvd.nist.gov/vuln/detail/CVE-2022-1619</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1620">https://access.redhat.com/security/cve/CVE-2022-1620</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620</a><br><a href="https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f">https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f</a><br><a href="https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51">https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">https://nvd.nist.gov/vuln/detail/CVE-2022-1620</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1621">https://access.redhat.com/security/cve/CVE-2022-1621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)</a><br><a href="https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb">https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">https://nvd.nist.gov/vuln/detail/CVE-2022-1621</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1629">https://access.redhat.com/security/cve/CVE-2022-1629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629</a><br><a href="https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd">https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd</a><br><a href="https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee">https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">https://nvd.nist.gov/vuln/detail/CVE-2022-1629</a><br></details> |
| vim-tiny | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1851">https://access.redhat.com/security/cve/CVE-2022-1851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851</a><br><a href="https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad">https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad</a><br><a href="https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d">https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">https://nvd.nist.gov/vuln/detail/CVE-2022-1851</a><br></details> |
| vim-tiny | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1927">https://access.redhat.com/security/cve/CVE-2022-1927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)</a><br><a href="https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777">https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| vim-tiny | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1942">https://access.redhat.com/security/cve/CVE-2022-1942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)</a><br><a href="https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071">https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| vim-tiny | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1968">https://access.redhat.com/security/cve/CVE-2022-1968</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968</a><br><a href="https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895">https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br></details> |
| vim-tiny | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3973">https://access.redhat.com/security/cve/CVE-2021-3973</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)</a><br><a href="https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e">https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">https://nvd.nist.gov/vuln/detail/CVE-2021-3973</a><br><a href="https://ubuntu.com/security/notices/USN-5247-1">https://ubuntu.com/security/notices/USN-5247-1</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4193">https://access.redhat.com/security/cve/CVE-2021-4193</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193</a><br><a href="https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b">https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4193.html">https://linux.oracle.com/cve/CVE-2021-4193.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">https://nvd.nist.gov/vuln/detail/CVE-2021-4193</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0443">https://access.redhat.com/security/cve/CVE-2022-0443</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)</a><br><a href="https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51">https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">https://nvd.nist.gov/vuln/detail/CVE-2022-0443</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0729">https://access.redhat.com/security/cve/CVE-2022-0729</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)</a><br><a href="https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea">https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">https://nvd.nist.gov/vuln/detail/CVE-2022-0729</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1733">https://access.redhat.com/security/cve/CVE-2022-1733</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733</a><br><a href="https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813">https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813</a><br><a href="https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a">https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">https://nvd.nist.gov/vuln/detail/CVE-2022-1733</a><br></details> |
| vim-tiny | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1735">https://access.redhat.com/security/cve/CVE-2022-1735</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735</a><br><a href="https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97">https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97</a><br><a href="https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9">https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">https://nvd.nist.gov/vuln/detail/CVE-2022-1735</a><br></details> |
| vim-tiny | CVE-2022-1769 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1769">https://access.redhat.com/security/cve/CVE-2022-1769</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1769</a><br><a href="https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4">https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4</a><br><a href="https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c">https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1769">https://nvd.nist.gov/vuln/detail/CVE-2022-1769</a><br></details> |
| vim-tiny | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1785">https://access.redhat.com/security/cve/CVE-2022-1785</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785</a><br><a href="https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839">https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839</a><br><a href="https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109">https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">https://nvd.nist.gov/vuln/detail/CVE-2022-1785</a><br></details> |
| vim-tiny | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1796">https://access.redhat.com/security/cve/CVE-2022-1796</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796</a><br><a href="https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5">https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5</a><br><a href="https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e">https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">https://nvd.nist.gov/vuln/detail/CVE-2022-1796</a><br></details> |
| vim-tiny | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1898">https://access.redhat.com/security/cve/CVE-2022-1898</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898</a><br><a href="https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a">https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a</a><br><a href="https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea">https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">https://nvd.nist.gov/vuln/detail/CVE-2022-1898</a><br></details> |
| xxd | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4166">https://access.redhat.com/security/cve/CVE-2021-4166</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href="https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035">https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">https://nvd.nist.gov/vuln/detail/CVE-2021-4166</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br></details> |
| xxd | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4192">https://access.redhat.com/security/cve/CVE-2021-4192</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192</a><br><a href="https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952">https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4192.html">https://linux.oracle.com/cve/CVE-2021-4192.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">https://nvd.nist.gov/vuln/detail/CVE-2021-4192</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0213">https://access.redhat.com/security/cve/CVE-2022-0213</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213</a><br><a href="https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26">https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26</a><br><a href="https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed">https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0261">https://access.redhat.com/security/cve/CVE-2022-0261</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)</a><br><a href="https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82">https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0261.html">https://linux.oracle.com/cve/CVE-2022-0261.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">https://nvd.nist.gov/vuln/detail/CVE-2022-0261</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0318">https://access.redhat.com/security/cve/CVE-2022-0318</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318</a><br><a href="https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc">https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc</a><br><a href="https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08">https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0318.html">https://linux.oracle.com/cve/CVE-2022-0318.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">https://nvd.nist.gov/vuln/detail/CVE-2022-0318</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0319">https://access.redhat.com/security/cve/CVE-2022-0319</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319</a><br><a href="https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9">https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9</a><br><a href="https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b">https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0351">https://access.redhat.com/security/cve/CVE-2022-0351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href="https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161">https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0359">https://access.redhat.com/security/cve/CVE-2022-0359</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href="https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def">https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0359.html">https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0361">https://access.redhat.com/security/cve/CVE-2022-0361</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href="https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b">https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0361.html">https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0368">https://access.redhat.com/security/cve/CVE-2022-0368</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0392">https://access.redhat.com/security/cve/CVE-2022-0392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)</a><br><a href="https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126">https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0392.html">https://linux.oracle.com/cve/CVE-2022-0392.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</a><br></details> |
| xxd | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0408">https://access.redhat.com/security/cve/CVE-2022-0408</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)</a><br><a href="https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d">https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0413">https://access.redhat.com/security/cve/CVE-2022-0413</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413</a><br><a href="https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a">https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a</a><br><a href="https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38">https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0413.html">https://linux.oracle.com/cve/CVE-2022-0413.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</a><br></details> |
| xxd | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0417">https://access.redhat.com/security/cve/CVE-2022-0417</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417</a><br><a href="https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a">https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a</a><br><a href="https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a">https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">https://nvd.nist.gov/vuln/detail/CVE-2022-0417</a><br></details> |
| xxd | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0554">https://access.redhat.com/security/cve/CVE-2022-0554</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554</a><br><a href="https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8">https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8</a><br><a href="https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71">https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">https://nvd.nist.gov/vuln/detail/CVE-2022-0554</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0572">https://access.redhat.com/security/cve/CVE-2022-0572</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)</a><br><a href="https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf">https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">https://nvd.nist.gov/vuln/detail/CVE-2022-0572</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0629">https://access.redhat.com/security/cve/CVE-2022-0629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629</a><br><a href="https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc">https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc</a><br><a href="https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877">https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">https://nvd.nist.gov/vuln/detail/CVE-2022-0629</a><br></details> |
| xxd | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0685">https://access.redhat.com/security/cve/CVE-2022-0685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)</a><br><a href="https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782">https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">https://nvd.nist.gov/vuln/detail/CVE-2022-0685</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0714">https://access.redhat.com/security/cve/CVE-2022-0714</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)</a><br><a href="https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3">https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">https://nvd.nist.gov/vuln/detail/CVE-2022-0714</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0943">https://access.redhat.com/security/cve/CVE-2022-0943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)</a><br><a href="https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1">https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">https://nvd.nist.gov/vuln/detail/CVE-2022-0943</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1154">https://access.redhat.com/security/cve/CVE-2022-1154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154</a><br><a href="https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5">https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5</a><br><a href="https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425">https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1154.html">https://linux.oracle.com/cve/CVE-2022-1154.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1552.html">https://linux.oracle.com/errata/ELSA-2022-1552.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">https://nvd.nist.gov/vuln/detail/CVE-2022-1154</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1420">https://access.redhat.com/security/cve/CVE-2022-1420</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)</a><br><a href="https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326">https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">https://nvd.nist.gov/vuln/detail/CVE-2022-1420</a><br></details> |
| xxd | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1616">https://access.redhat.com/security/cve/CVE-2022-1616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)</a><br><a href="https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2">https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">https://nvd.nist.gov/vuln/detail/CVE-2022-1616</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1619">https://access.redhat.com/security/cve/CVE-2022-1619</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619</a><br><a href="https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe">https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe</a><br><a href="https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450">https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">https://nvd.nist.gov/vuln/detail/CVE-2022-1619</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1620">https://access.redhat.com/security/cve/CVE-2022-1620</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620</a><br><a href="https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f">https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f</a><br><a href="https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51">https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">https://nvd.nist.gov/vuln/detail/CVE-2022-1620</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1621">https://access.redhat.com/security/cve/CVE-2022-1621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)</a><br><a href="https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb">https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">https://nvd.nist.gov/vuln/detail/CVE-2022-1621</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1629">https://access.redhat.com/security/cve/CVE-2022-1629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629</a><br><a href="https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd">https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd</a><br><a href="https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee">https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">https://nvd.nist.gov/vuln/detail/CVE-2022-1629</a><br></details> |
| xxd | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1851">https://access.redhat.com/security/cve/CVE-2022-1851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851</a><br><a href="https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad">https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad</a><br><a href="https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d">https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">https://nvd.nist.gov/vuln/detail/CVE-2022-1851</a><br></details> |
| xxd | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1927">https://access.redhat.com/security/cve/CVE-2022-1927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)</a><br><a href="https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777">https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| xxd | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1942">https://access.redhat.com/security/cve/CVE-2022-1942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)</a><br><a href="https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071">https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| xxd | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1968">https://access.redhat.com/security/cve/CVE-2022-1968</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968</a><br><a href="https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895">https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br></details> |
| xxd | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3973">https://access.redhat.com/security/cve/CVE-2021-3973</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)</a><br><a href="https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e">https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">https://nvd.nist.gov/vuln/detail/CVE-2021-3973</a><br><a href="https://ubuntu.com/security/notices/USN-5247-1">https://ubuntu.com/security/notices/USN-5247-1</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4193">https://access.redhat.com/security/cve/CVE-2021-4193</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193</a><br><a href="https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b">https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4193.html">https://linux.oracle.com/cve/CVE-2021-4193.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">https://nvd.nist.gov/vuln/detail/CVE-2021-4193</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0443">https://access.redhat.com/security/cve/CVE-2022-0443</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)</a><br><a href="https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51">https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">https://nvd.nist.gov/vuln/detail/CVE-2022-0443</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0729">https://access.redhat.com/security/cve/CVE-2022-0729</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)</a><br><a href="https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea">https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">https://nvd.nist.gov/vuln/detail/CVE-2022-0729</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1733">https://access.redhat.com/security/cve/CVE-2022-1733</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733</a><br><a href="https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813">https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813</a><br><a href="https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a">https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">https://nvd.nist.gov/vuln/detail/CVE-2022-1733</a><br></details> |
| xxd | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1735">https://access.redhat.com/security/cve/CVE-2022-1735</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735</a><br><a href="https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97">https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97</a><br><a href="https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9">https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">https://nvd.nist.gov/vuln/detail/CVE-2022-1735</a><br></details> |
| xxd | CVE-2022-1769 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1769">https://access.redhat.com/security/cve/CVE-2022-1769</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1769">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1769</a><br><a href="https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4">https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4</a><br><a href="https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c">https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1769">https://nvd.nist.gov/vuln/detail/CVE-2022-1769</a><br></details> |
| xxd | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1785">https://access.redhat.com/security/cve/CVE-2022-1785</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785</a><br><a href="https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839">https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839</a><br><a href="https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109">https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">https://nvd.nist.gov/vuln/detail/CVE-2022-1785</a><br></details> |
| xxd | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1796">https://access.redhat.com/security/cve/CVE-2022-1796</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796</a><br><a href="https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5">https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5</a><br><a href="https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e">https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">https://nvd.nist.gov/vuln/detail/CVE-2022-1796</a><br></details> |
| xxd | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1898">https://access.redhat.com/security/cve/CVE-2022-1898</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898</a><br><a href="https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a">https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a</a><br><a href="https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea">https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">https://nvd.nist.gov/vuln/detail/CVE-2022-1898</a><br></details> |

View File

@ -0,0 +1 @@
{{ include "tc.common.loader.all" . }}

View File

View File

@ -0,0 +1,99 @@
# Changelog<br>
<a name="jellyfin-11.0.8"></a>
### [jellyfin-11.0.8](https://github.com/truecharts/apps/compare/jellyfin-11.0.7...jellyfin-11.0.8) (2022-06-27)
#### Chore
* update docker general non-major ([#2999](https://github.com/truecharts/apps/issues/2999))
<a name="jellyfin-11.0.7"></a>
### [jellyfin-11.0.7](https://github.com/truecharts/apps/compare/jellyfin-11.0.6...jellyfin-11.0.7) (2022-06-25)
#### Chore
* update helm general non-major helm releases ([#2977](https://github.com/truecharts/apps/issues/2977))
<a name="jellyfin-11.0.6"></a>
### [jellyfin-11.0.6](https://github.com/truecharts/apps/compare/jellyfin-11.0.5...jellyfin-11.0.6) (2022-06-22)
#### Chore
* update helm general non-major helm releases ([#2948](https://github.com/truecharts/apps/issues/2948))
<a name="jellyfin-11.0.5"></a>
### [jellyfin-11.0.5](https://github.com/truecharts/apps/compare/jellyfin-11.0.4...jellyfin-11.0.5) (2022-06-21)
#### Chore
* update helm general non-major helm releases ([#2943](https://github.com/truecharts/apps/issues/2943))
<a name="jellyfin-11.0.4"></a>
### [jellyfin-11.0.4](https://github.com/truecharts/apps/compare/jellyfin-11.0.3...jellyfin-11.0.4) (2022-06-14)
#### Chore
* update helm general non-major helm releases ([#2886](https://github.com/truecharts/apps/issues/2886))
<a name="jellyfin-11.0.3"></a>
### [jellyfin-11.0.3](https://github.com/truecharts/apps/compare/jellyfin-11.0.2...jellyfin-11.0.3) (2022-06-11)
#### Chore
* update helm general non-major helm releases ([#2854](https://github.com/truecharts/apps/issues/2854))
* update docker general non-major ([#2856](https://github.com/truecharts/apps/issues/2856))
<a name="jellyfin-11.0.2"></a>
### [jellyfin-11.0.2](https://github.com/truecharts/apps/compare/jellyfin-11.0.1...jellyfin-11.0.2) (2022-06-07)
#### Fix
* hotpatch to disable HPA and networkPolicy in SCALE interface, due to incompatible format.
<a name="jellyfin-11.0.1"></a>
### [jellyfin-11.0.1](https://github.com/truecharts/apps/compare/jellyfin-10.0.19...jellyfin-11.0.1) (2022-06-07)
#### Chore
* Auto-update chart README [skip ci]
* sync all apps persistence configuration and always default to PVC
#### Fix
* remove malfunctioning SCALE migration script
#### Refactor
* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836))
<a name="jellyfin-11.0.0"></a>
### [jellyfin-11.0.0](https://github.com/truecharts/apps/compare/jellyfin-10.0.19...jellyfin-11.0.0) (2022-06-07)
#### Chore
* sync all apps persistence configuration and always default to PVC
#### Refactor
* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836))
<a name="jellyfin-10.0.19"></a>

View File

@ -0,0 +1,7 @@
# Configuration Options
##### Connecting to other apps
If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide.
##### Available config options
In the future this page is going to contain an automated list of options available in the installation/edit UI.

View File

@ -0,0 +1,6 @@
dependencies:
- name: common
repository: https://library-charts.truecharts.org
version: 10.1.4
digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2
generated: "2022-06-27T16:21:54.51874452Z"

View File

@ -0,0 +1,29 @@
apiVersion: v2
appVersion: "10.8.1"
dependencies:
- name: common
repository: https://library-charts.truecharts.org
version: 10.1.4
deprecated: false
description: Jellyfin is a Free Software Media System
home: https://github.com/truecharts/apps/tree/master/charts/stable/jellyfin
icon: https://truecharts.org/_static/img/appicons/jellyfin.png
keywords:
- jellyfin
- plex
- emby
kubeVersion: '>=1.16.0-0'
maintainers:
- email: info@truecharts.org
name: TrueCharts
url: https://truecharts.org
name: jellyfin
sources:
- https://github.com/jellyfin/jellyfin
type: application
version: 11.0.8
annotations:
truecharts.org/catagories: |
- media
truecharts.org/SCALE-support: "true"
truecharts.org/grade: U

View File

@ -0,0 +1,37 @@
# Introduction
Jellyfin is a Free Software Media System
TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation.
**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)**
## Source Code
* <https://github.com/jellyfin/jellyfin>
## Requirements
Kubernetes: `>=1.16.0-0`
## Dependencies
| Repository | Name | Version |
|------------|------|---------|
| https://library-charts.truecharts.org | common | 10.1.4 |
## Installing the Chart
To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/).
## Upgrading, Rolling Back and Uninstalling the Chart
To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/).
## Support
- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first.
- See the [Wiki](https://truecharts.org)
- Check our [Discord](https://discord.gg/tVsPTHWTtr)
- Open a [issue](https://github.com/truecharts/apps/issues/new/choose)
---
All Rights Reserved - The TrueCharts Project

View File

@ -0,0 +1,3 @@
Jellyfin is a Free Software Media System
This App is supplied by TrueCharts, for more information please visit https://truecharts.org

Some files were not shown because too many files have changed in this diff Show More